{"id":"CVE-2023-52838","summary":"fbdev: imsttfb: fix a resource leak in probe","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: imsttfb: fix a resource leak in probe\n\nI've re-written the error handling but the bug is that if init_imstt()\nfails we need to call iounmap(par-\u003ecmap_regs).","modified":"2026-04-02T09:43:24.172509Z","published":"2024-05-21T15:31:38.539Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2571-1","SUSE-SU-2024:2896-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52838.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/18d26f9baca7d0d309303e3074a2252b8310884a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/382e1931e0c9cd58a5a8519cdc6cd9dc4d82b485"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6c66d737b2726ac7784269ddf32a31634f8f269d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7bc7b82fb2191b0d50a80ee4e27030918767dd1d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8e4b510fe91782522b7ca0ca881b663b5d35e513"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a4dfebec32ec6d420a5506dd56a7834c91be28e4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/aba6ab57a910ad4b940c2024d15f2cdbf5b7f76b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b346a531159d08c564a312a9eaeea691704f3c00"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52838.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52838"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"7f683f286a2196bd4d2da420a3194f5ba0269d8c"},{"fixed":"382e1931e0c9cd58a5a8519cdc6cd9dc4d82b485"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"815c95d82b79bb32e9aa7c95c6ac7cb1c92612cd"},{"fixed":"6c66d737b2726ac7784269ddf32a31634f8f269d"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2bf70b88cc358a437db376826f92c8dcf9c23587"},{"fixed":"a4dfebec32ec6d420a5506dd56a7834c91be28e4"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"ad3de274e065790181f112b9c72a2fb4665ee2fd"},{"fixed":"8e4b510fe91782522b7ca0ca881b663b5d35e513"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c6c0a9f619584be19726ce7f81c31bc555af401a"},{"fixed":"7bc7b82fb2191b0d50a80ee4e27030918767dd1d"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c75f5a55061091030a13fef71b9995b89bc86213"},{"fixed":"18d26f9baca7d0d309303e3074a2252b8310884a"},{"fixed":"b346a531159d08c564a312a9eaeea691704f3c00"},{"fixed":"aba6ab57a910ad4b940c2024d15f2cdbf5b7f76b"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"64c6b84c73f576380fadeec2d30aaeccbc2994c7"},{"last_affected":"4c86974fb42281b8041a504d92ab341ad4697325"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52838.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}