CVE-2023-54109
Description
In the Linux kernel, the following vulnerability has been resolved:
media: rcar_fdp1: Fix refcount leak in probe and remove function
rcar_fcp_get() take reference, which should be balanced with rcar_fcp_put(). Add missing rcar_fcp_put() in fdp1_remove and the error paths of fdp1_probe() to fix this.
[hverkuil: resolve merge conflict, remove() is now void]
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A refcount leak in the Renesas rcar_fdp1 driver fails to release FCP references on probe failures and removal, risking memory exhaustion.
Overview
In the Linux kernel's Renesas rcar_fdp1 media driver, the functions rcar_fdp1_probe() and rcar_fdp1_remove() call rcar_fcp_get() to obtain a reference to the functional clock and power-management (FCP) device. However, the corresponding rcar_fcp_put() call was missing along error paths in the probe function and in the remove function, causing a refcount leak.
Exploitation
This vulnerability is triggered when probing the rcar_fdp1 driver fails or when the driver is removed. An attacker with the ability to repeatedly cause the driver to load or unload—or to trigger probe failures—could cause the kernel to leak references. The leak does not require any special permissions beyond the ability to interact with the driver's device lifecycle (e.g., hotplugging, module load/unload).
Impact
Over time, repeated exploitation of this refcount leak can lead to memory exhaustion or resource starvation, because the underlying FCP hardware block is not properly released. This could lead to denial-of-service conditions on systems using the Renesas R-Car Gen3 display pipeline.
Mitigation
The fix adds the missing rcar_fcp_put() calls in both the error paths of fdp1_probe() and in fdp1_remove(). The patch has been applied to the stable kernel trees as indicated by the referenced commits [1], [2], and [3]. Users should update their kernels to include this fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
8418a8f3140e09df630dafa1a1acb982e36162322b262d22045b7461d914c59c6addfaaaa48765ca7c6b7c766c90faf93Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/1acb982e3616e70128994fdecf2368a259c8a489nvd
- git.kernel.org/stable/c/2322b262d2205720518785c2706a3283725ba402nvd
- git.kernel.org/stable/c/418a8f3140e07f33bbd5a81625d0ef46c0732cefnvd
- git.kernel.org/stable/c/45b7461d914c867ef21c74798da8c42d13d3a0dfnvd
- git.kernel.org/stable/c/48765ca7c6b71bf73a4cc8475a4bad9e2633cf61nvd
- git.kernel.org/stable/c/59c6addfaaaa09ff7654e4d8793cb16fd22a46d4nvd
- git.kernel.org/stable/c/9df630dafa1a59946d1da6f070d4cb64f14ea57cnvd
- git.kernel.org/stable/c/c766c90faf93897b77c9c5daa603cffab85ba907nvd
News mentions
0No linked articles in our index yet.