CVE-2023-54307
Description
In the Linux kernel, the following vulnerability has been resolved:
ptp_qoriq: fix memory leak in probe()
Smatch complains that: drivers/ptp/ptp_qoriq.c ptp_qoriq_probe() warn: 'base' from ioremap() not released.
Fix this by revising the parameter from 'ptp_qoriq->base' to 'base'. This is only a bug if ptp_qoriq_init() returns on the first -ENODEV error path. For other error paths ptp_qoriq->base and base are the same. And this change makes the code more readable.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Memory leak in ptp_qoriq driver probe due to missing ioremap release on error path; patched in Linux kernel.
Root
Cause In the Linux kernel's ptp_qoriq driver, the probe function calls ioremap() to map device memory into 'base'. However, on an early error path (when ptp_qoriq_init() returns -ENODEV), the function failed to release the ioremap() mapping by calling iounmap() on the local variable 'base', instead using ptp_qoriq->base which is still NULL at that point. This led to a memory leak of the mapped region.
Exploitation
The vulnerability is local, requiring access to the system to trigger the affected hardware probing. No authentication is needed beyond local user access to cause the device probe to fail on that specific error path. The attack surface is limited to systems using the QorIQ PTP hardware and loading the driver.
Impact
An attacker with local access could repeatedly trigger the leak, exhausting kernel memory and potentially leading to denial of service. However, the leak occurs only on a specific error path, making exploitation less likely in normal operation.
Mitigation
The fix has been applied to the Linux kernel stable branches via commits [1] and [2]. Users should update to the latest kernel version containing these patches.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
646c4993a15143907fcb5a439c0de1a26e65943b4331ce0cdc960785c8168f33642224e38Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/3907fcb5a439933cf8c10d6dc300bc11eba30de3nvd
- git.kernel.org/stable/c/43b4331ce0cd88ccba425e0702ba35c1a52daccfnvd
- git.kernel.org/stable/c/46c4993a1514eea3bbc7147d0c81c23cc06c6bednvd
- git.kernel.org/stable/c/c0de1a26e6595b0e7969c5b35990a77a2d93104fnvd
- git.kernel.org/stable/c/c960785c8168d0e572101ed921b9be3934ed0bc9nvd
- git.kernel.org/stable/c/f33642224e38d7e0d59336e10e7b4e370b1c4506nvd
News mentions
0No linked articles in our index yet.