VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54075

CVE-2023-54075

Description

In the Linux kernel, the following vulnerability has been resolved:

ASoC: mediatek: common: Fix refcount leak in parse_dai_link_info

Add missing of_node_put()s before the returns to balance of_node_get()s and of_node_put()s, which may get unbalanced in case the for loop 'for_each_available_child_of_node' returns early.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A summary of the vulnerability is that a reference count leak in the Linux kernel's ASoC Mediatek common driver can occur when parsing DAI link information, leading to potential memory resource issues.

Vulnerability

Overview

In the Linux kernel, a reference count leak vulnerability exists in the ASoC Mediatek common driver's parse_dai_link_info function. The issue arises from missing of_node_put() calls before early returns in a loop that uses for_each_available_child_of_node. This macro increments the reference count of device nodes, and without proper decrementing, the reference count can become unbalanced, leading to a leak [1].

Exploitation

To exploit this vulnerability, an attacker would need to trigger the specific code path where the loop returns early, such as when an error occurs during parsing. The attack surface is local, requiring access to the system to load or manipulate device tree nodes that cause the parsing function to exit prematurely. No authentication is needed beyond local access, and the vulnerability can be triggered through normal system operations involving audio hardware initialization.

Impact

If exploited, the reference count leak can lead to memory resource exhaustion over time, potentially causing system instability, or denial of service. The leak prevents proper cleanup of device node references, which may cause the kernel to retain references to nodes that should be freed, potentially leading to use-after-free or other memory corruption issues in the long term.

Mitigation

The fix has been applied in the Linux kernel stable tree via commit beed115c2ce78f990222a29abed042582df4e87c [1]. Users should update their kernel to include this patch. No workaround is available other than applying the patch.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

2

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

2

News mentions

0

No linked articles in our index yet.