VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2023-53858

CVE-2023-53858

Description

In the Linux kernel, the following vulnerability has been resolved:

tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() in case of error

If clk_get_rate() fails, the clk that has just been allocated needs to be freed.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Fix a memory leak in the s3c24xx_serial_getclk() function when clk_get_rate() fails.

In the Linux kernel, a memory leak vulnerability was found in the Samsung serial driver (samsung_tty). The function s3c24xx_serial_getclk() allocates a clock (clk) but does not properly free it if clk_get_rate() fails. This leads to a memory leak [1].

Root

Cause The issue occurs in the error handling path of s3c24xx_serial_getclk(). When clk_get_rate() returns an error, the allocated clock is not released, causing a leak of kernel memory. The fix adds the missing clk_put() call to properly free the clock in the error case [1][2][3].

Impact

An attacker with the ability to trigger the error path (e.g., by causing clk_get_rate() to fail) could exhaust kernel memory over time, potentially leading to a denial-of-service (DoS) condition. No other security impact beyond memory exhaustion is cited.

Mitigation

The vulnerability is fixed in Linux kernel stable updates. Users should apply the relevant patches. There is no known workaround for affected systems.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.