CVE-2023-53255
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.0 (inc) to 5.4.251 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.188 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.121 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.40 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.4.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a potential resource leak in the Linux kernel's stratix10-svc firmware driver. Specifically, the function svc_create_memory_pool() calls memremap() to map memory but does not properly unmap it because there is no corresponding memunmap() call. This can lead to resources not being released correctly. The fix involved switching to devm_memremap(), which automatically manages the resource lifecycle to prevent the leak.
How can this vulnerability impact me? :
The resource leak caused by this vulnerability could lead to increased memory usage or exhaustion in the kernel, potentially causing degraded system performance or instability. Over time, if the leaked resources accumulate, it might result in system crashes or failures in the affected driver functionality.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by switching to devm_memremap() in the stratix10_svc driver to avoid a resource leak. To mitigate this vulnerability, update your Linux kernel to a version that includes this fix for the stratix10_svc driver.