VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54136

CVE-2023-54136

Description

In the Linux kernel, the following vulnerability has been resolved:

serial: sprd: Fix DMA buffer leak issue

Release DMA buffer when _probe() returns failure to avoid memory leak.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, a DMA buffer leak in the Spreadtrum serial driver occurs when probe fails, fixed by releasing the buffer to avoid memory leak.

Vulnerability

CVE-2023-54136 is a memory leak vulnerability in the Linux kernel's Spreadtrum (sprd) serial driver. serial driver. The issue arises in the driver's probe function, where a DMA buffer is allocated but not properly released if the probe function returns a failure. This results in a DMA buffer leak, as the allocated memory is not freed on the device is not freed, leading to resource exhaustion over time.

Exploitation

Exploitation of this vulnerability requires the ability to trigger a probe failure in the sprd serial driver, which could occur during system initialization or when the driver is loaded on a system with the affected hardware. No special privileges are needed beyond the ability to load the driver, but the attack surface is limited to systems using the Spreadtrum serial hardware. The vulnerability is a memory leak, not a direct code execution path, so exploitation is typically exploited as a denial-of-service vector.

Impact

An attacker who can repeatedly trigger probe failures could exhaust the system memory, leading to a denial-of-service condition. The leak is specific to DMA buffers, which are limited resources, and could cause the system to become unresponsive or crash if memory is exhausted. The vulnerability does not provide any privilege escalation or data disclosure capabilities.

Mitigation

The fix for this vulnerability is to release the DMA buffer when the probe function fails, which has been implemented in the Linux kernel stable tree. The commit references [1], [2], and [3] are all stable backports of the same fix. Users should update their kernel to a version that includes this patch. No workarounds are documented, but the issue is resolved by applying the kernel update.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

7

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.