CVE-2023-53744
Description
In the Linux kernel, the following vulnerability has been resolved:
soc: ti: pm33xx: Fix refcount leak in am33xx_pm_probe
wkup_m3_ipc_get() takes refcount, which should be freed by wkup_m3_ipc_put(). Add missing refcount release in the error paths.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A refcount leak in the Linux kernel's TI AM33xx PM driver could lead to resource exhaustion; fixed by adding missing wkup_m3_ipc_put() calls.
Vulnerability
In the Linux kernel's TI AM33xx power management driver (pm33xx.c), the function am33xx_pm_probe calls wkup_m3_ipc_get() to obtain a reference to the Wakeup M3 IPC handle. This function increments a reference count that must later be decremented with wkup_m3_ipc_put(). However, several error paths within the probe function fail to release this reference, leading to a reference count leak [1].
Exploitation
The leak is triggered when the probe function encounters an error after successfully obtaining the IPC handle. An attacker with local access could potentially force probe failures—for example, by manipulating device tree entries or causing hardware misconfiguration—to repeatedly trigger the leak. No special privileges beyond the ability to affect driver probing are required, though the attack surface is limited to systems using the TI AM33xx SoC.
Impact
Each leaked reference consumes kernel memory and prevents proper cleanup of the IPC resource. Over time, repeated exploitation could exhaust kernel memory or leave the driver in an inconsistent state, resulting in a denial of service (DoS) condition.
Mitigation
The fix adds the missing wkup_m3_ipc_put() calls in the error paths of am33xx_pm_probe. Patches have been applied to the stable kernel trees; users should update to a kernel version containing the commit referenced in [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
608310f8109756a50350033e06dbcc493a18de6c6b40c9bf465305e8c00098f3c307b580aVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/08310f810975c8c9e17c6ffb99fdb76a84e8adb7nvd
- git.kernel.org/stable/c/65305e8c0009a1933679dad5c8196060a10f3c8bnvd
- git.kernel.org/stable/c/6a50350033e0e0854acf59a8413913b4de04bd7dnvd
- git.kernel.org/stable/c/6dbcc493a18dd60947c2168a39df0ec2fe7b5110nvd
- git.kernel.org/stable/c/8f3c307b580a4a6425896007325bddefc36e8d91nvd
- git.kernel.org/stable/c/e6c6b40c9bf49ce9b5493b146bfeb96359937cfanvd
News mentions
0No linked articles in our index yet.