VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54111

CVE-2023-54111

Description

In the Linux kernel, the following vulnerability has been resolved:

pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups

of_find_node_by_phandle() returns a node pointer with refcount incremented, We should use of_node_put() on it when not needed anymore. Add missing of_node_put() to avoid refcount leak.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Fix refcount leak in rockchip_pinctrl_parse_groups by adding missing of_node_put() to prevent memory leak.

Vulnerability

In the Linux kernel, the rockchip pinctrl driver's rockchip_pinctrl_parse_groups function calls of_find_node_by_phandle() which returns a device node pointer with its reference count incremented. The function failed to call of_node_put() after using the node, causing a reference count leak [1]. This is a common memory management bug in Linux kernel device tree parsing code.

Exploitation

The vulnerability is in the kernel's pinctrl subsystem for Rockchip platforms. An unprivileged attacker cannot directly trigger this path unless they can control device tree content, which typically requires local root access or loading a crafted device tree overlay. The refcount leak accumulates over time during normal operation or repeated driver probing, eventually leading to memory exhaustion.

Impact

An attacker with the ability to repeatedly trigger the vulnerable code path can cause a denial of service by exhausting kernel memory through the refcount leak. While the leak does not provide arbitrary code execution or privilege escalation, it can degrade system stability and availability.

Mitigation

The fix adds a missing of_node_put() call to properly release the reference. The stable kernel commit hash 3c40b34e3462aab12af3dba77d2e1602afc72e80 [2] resolves the issue, along with additional backports [3]. Users should update to the latest stable kernel that includes the fix.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.