CVE-2023-54136
Description
In the Linux kernel, the following vulnerability has been resolved:
serial: sprd: Fix DMA buffer leak issue
Release DMA buffer when _probe() returns failure to avoid memory leak.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel, a DMA buffer leak in the Spreadtrum serial driver occurs when probe fails, fixed by releasing the buffer to avoid memory leak.
Vulnerability
CVE-2023-54136 is a memory leak vulnerability in the Linux kernel's Spreadtrum (sprd) serial driver. serial driver. The issue arises in the driver's probe function, where a DMA buffer is allocated but not properly released if the probe function returns a failure. This results in a DMA buffer leak, as the allocated memory is not freed on the device is not freed, leading to resource exhaustion over time.
Exploitation
Exploitation of this vulnerability requires the ability to trigger a probe failure in the sprd serial driver, which could occur during system initialization or when the driver is loaded on a system with the affected hardware. No special privileges are needed beyond the ability to load the driver, but the attack surface is limited to systems using the Spreadtrum serial hardware. The vulnerability is a memory leak, not a direct code execution path, so exploitation is typically exploited as a denial-of-service vector.
Impact
An attacker who can repeatedly trigger probe failures could exhaust the system memory, leading to a denial-of-service condition. The leak is specific to DMA buffers, which are limited resources, and could cause the system to become unresponsive or crash if memory is exhausted. The vulnerability does not provide any privilege escalation or data disclosure capabilities.
Mitigation
The fix for this vulnerability is to release the DMA buffer when the probe function fails, which has been implemented in the Linux kernel stable tree. The commit references [1], [2], and [3] are all stable backports of the same fix. Users should update their kernel to a version that includes this patch. No workarounds are documented, but the issue is resolved by applying the kernel update.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
7c65be6ad55e59a26aaea6c21f34508d934c46d209ed70f9c0237f913694d4ee715e54e25cd119fdc3ee1Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- git.kernel.org/stable/c/0237f913694d57bcd7e0e7ae6f255b648a1c42a7nvd
- git.kernel.org/stable/c/4ee715e54e255b1be65722f715fca939d5c2ca7anvd
- git.kernel.org/stable/c/6d209ed70f9c388727995aaece1f930fe63d402bnvd
- git.kernel.org/stable/c/9a26aaea6c212ea26bab159933dbfd3321a491f6nvd
- git.kernel.org/stable/c/c65be6ad55e5e45f8c4e40e1d8d7fe0e21b26e77nvd
- git.kernel.org/stable/c/cd119fdc3ee1450fbf7f78862b5de44c42b6e47fnvd
- git.kernel.org/stable/c/f34508d934c4f2efb6a85787fc37f42184dabadfnvd
News mentions
0No linked articles in our index yet.