VYPR
Unrated severityNVD Advisory· Published Dec 8, 2025· Updated Apr 15, 2026

CVE-2023-53757

CVE-2023-53757

Description

In the Linux kernel, the following vulnerability has been resolved:

irqchip/irq-mvebu-gicp: Fix refcount leak in mvebu_gicp_probe

of_irq_find_parent() returns a node pointer with refcount incremented, We should use of_node_put() on it when not needed anymore. Add missing of_node_put() to avoid refcount leak.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A refcount leak in the Linux kernel's mvebu-gicp driver leads to a memory leak; fixed by adding a missing of_node_put().

Root

Cause

A reference count leak exists in the mvebu_gicp_probe function of the irqchip/irq-mvebu-gicp driver. The function of_irq_find_parent() returns a device node pointer with its reference count incremented. The code failed to call of_node_put() on this node after use, causing the reference count to never be decremented. This oversight prevents the kernel from properly freeing the device node, leading to a persistent memory leak.

Attack

Vector

This vulnerability is not directly exploitable by an unauthenticated attacker from userspace or over a network. The bug is triggered during the driver probe sequence, which occurs when the kernel initializes the Marvell GICP (Generic Interrupt Controller Partition) hardware. An attacker would require the ability to physically manipulate the hardware or to load a malicious device tree that causes the driver to probe repeatedly. However, the leak is cumulative and could be amplified in systems where the driver probes many times or where the system is under memory pressure.

Impact

An attacker with local access or control over device tree configuration could exploit this refcount leak to cause a denial of service by exhausting system memory over time. The leak results in a slow but steady consumption of kernel memory, reducing the memory available for other processes and potentially leading to system instability or a crash. No privilege escalation or data corruption is associated with this bug.

Mitigation

This issue is fixed by the commit that adds the missing of_node_put() call in mvebu_gicp_probe [1][2][3]. Patches have been applied to the stable kernel branches as referenced. Users should update their Linux kernel to a version that includes this fix. No workaround is available without applying the patch.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.