Home

Description

In the Linux kernel, the following vulnerability has been resolved: regulator: stm32-pwr: fix of_iomap leak Smatch reports: drivers/regulator/stm32-pwr.c:166 stm32_pwr_regulator_probe() warn: 'base' from of_iomap() not released on lines: 151,166. In stm32_pwr_regulator_probe(), base is not released when devm_kzalloc() fails to allocate memory or devm_regulator_register() fails to register a new regulator device, which may cause a leak. To fix this issue, replace of_iomap() with devm_platform_ioremap_resource(). devm_platform_ioremap_resource() is a specialized function for platform devices. It allows 'base' to be automatically released whether the probe function succeeds or fails. Besides, use IS_ERR(base) instead of !base as the return value of devm_platform_ioremap_resource() can either be a pointer to the remapped memory or an ERR_PTR() encoded error code if the operation fails.

PUBLISHED Reserved 2025-12-24 | Published 2025-12-24 | Updated 2025-12-24 | Assigner Linux

Product status

Default status
unaffected

dc62f951a6a8490bcccc7b6de36cd85bd57be740 (git) before 824683dbec234a01bd49a0589ee3323594a6f4cf
affected

dc62f951a6a8490bcccc7b6de36cd85bd57be740 (git) before dfce9bb3517a78507cf96f9b83948d0b81338afa
affected

dc62f951a6a8490bcccc7b6de36cd85bd57be740 (git) before ad6481f49fb2c703efa3a929643934f24b666d6a
affected

dc62f951a6a8490bcccc7b6de36cd85bd57be740 (git) before f25994f7a9ad53eb756bc4869497c3ebe281ad5e
affected

dc62f951a6a8490bcccc7b6de36cd85bd57be740 (git) before c091bb49b3233307c7af73dae888f0799752af3d
affected

dc62f951a6a8490bcccc7b6de36cd85bd57be740 (git) before 0ad07e02be0d3f0d554653382ffe53ae4879378d
affected

dc62f951a6a8490bcccc7b6de36cd85bd57be740 (git) before c4a413e56d16a2ae84e6d8992f215c4dcc7fac20
affected

Default status
affected

5.2
affected

Any version before 5.2
unaffected

5.4.243 (semver)
unaffected

5.10.180 (semver)
unaffected

5.15.111 (semver)
unaffected

6.1.28 (semver)
unaffected

6.2.15 (semver)
unaffected

6.3.2 (semver)
unaffected

6.4 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/824683dbec234a01bd49a0589ee3323594a6f4cf

git.kernel.org/...c/dfce9bb3517a78507cf96f9b83948d0b81338afa

git.kernel.org/...c/ad6481f49fb2c703efa3a929643934f24b666d6a

git.kernel.org/...c/f25994f7a9ad53eb756bc4869497c3ebe281ad5e

git.kernel.org/...c/c091bb49b3233307c7af73dae888f0799752af3d

git.kernel.org/...c/0ad07e02be0d3f0d554653382ffe53ae4879378d

git.kernel.org/...c/c4a413e56d16a2ae84e6d8992f215c4dcc7fac20

cve.org (CVE-2023-54097)

nvd.nist.gov (CVE-2023-54097)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.