{"id":"CVE-2023-53725","summary":"clocksource/drivers/cadence-ttc: Fix memory leak in ttc_timer_probe","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nclocksource/drivers/cadence-ttc: Fix memory leak in ttc_timer_probe\n\nSmatch reports:\ndrivers/clocksource/timer-cadence-ttc.c:529 ttc_timer_probe()\nwarn: 'timer_baseaddr' from of_iomap() not released on lines: 498,508,516.\n\ntimer_baseaddr may have the problem of not being released after use,\nI replaced it with the devm_of_iomap() function and added the clk_put()\nfunction to cleanup the \"clk_ce\" and \"clk_cs\".","modified":"2026-04-02T09:44:55.468194Z","published":"2025-10-22T13:23:55.200Z","related":["SUSE-SU-2025:21040-1","SUSE-SU-2025:21052-1","SUSE-SU-2025:21056-1","SUSE-SU-2025:21064-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4111-1","SUSE-SU-2025:4128-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4139-1","SUSE-SU-2025:4140-1","SUSE-SU-2025:4141-1","SUSE-SU-2025:4149-1","SUSE-SU-2025:4301-1","SUSE-SU-2025:4320-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53725.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/289e2054eeb63c9e133960731c342eeffad218d3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/54cc10a0f4b01b522e9519014200f1b33bf7e4aa"},{"type":"WEB","url":"https://git.kernel.org/stable/c/67d7eebbc424935dec61fb352d1ccae5d16cf429"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8b5bf64c89c7100c921bd807ba39b2eb003061ab"},{"type":"WEB","url":"https://git.kernel.org/stable/c/919dd531ebb7514f205ae7aab87994337ebce1f6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/99744200f28b2cf5f50767447e51b4b4a977d145"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e0a9cc90ea44a50d76a84f9f9bf1703d31fe45e9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ebdff0986513a29be242aace0ef89b6c105b0bf0"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53725.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53725"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e932900a3279b5dbb6d8f43c7b369003620e137c"},{"fixed":"e0a9cc90ea44a50d76a84f9f9bf1703d31fe45e9"},{"fixed":"54cc10a0f4b01b522e9519014200f1b33bf7e4aa"},{"fixed":"ebdff0986513a29be242aace0ef89b6c105b0bf0"},{"fixed":"289e2054eeb63c9e133960731c342eeffad218d3"},{"fixed":"919dd531ebb7514f205ae7aab87994337ebce1f6"},{"fixed":"67d7eebbc424935dec61fb352d1ccae5d16cf429"},{"fixed":"99744200f28b2cf5f50767447e51b4b4a977d145"},{"fixed":"8b5bf64c89c7100c921bd807ba39b2eb003061ab"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53725.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.10.0"},{"fixed":"4.19.291"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.251"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.188"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.121"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.39"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.3.13"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.4.0"},{"fixed":"6.4.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53725.json"}}],"schema_version":"1.7.5"}