CVE-2023-54111
Description
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups
of_find_node_by_phandle() returns a node pointer with refcount incremented, We should use of_node_put() on it when not needed anymore. Add missing of_node_put() to avoid refcount leak.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Fix refcount leak in rockchip_pinctrl_parse_groups by adding missing of_node_put() to prevent memory leak.
Vulnerability
In the Linux kernel, the rockchip pinctrl driver's rockchip_pinctrl_parse_groups function calls of_find_node_by_phandle() which returns a device node pointer with its reference count incremented. The function failed to call of_node_put() after using the node, causing a reference count leak [1]. This is a common memory management bug in Linux kernel device tree parsing code.
Exploitation
The vulnerability is in the kernel's pinctrl subsystem for Rockchip platforms. An unprivileged attacker cannot directly trigger this path unless they can control device tree content, which typically requires local root access or loading a crafted device tree overlay. The refcount leak accumulates over time during normal operation or repeated driver probing, eventually leading to memory exhaustion.
Impact
An attacker with the ability to repeatedly trigger the vulnerable code path can cause a denial of service by exhausting kernel memory through the refcount leak. While the leak does not provide arbitrary code execution or privilege escalation, it can degrade system stability and availability.
Mitigation
The fix adds a missing of_node_put() call to properly release the reference. The stable kernel commit hash 3c40b34e3462aab12af3dba77d2e1602afc72e80 [2] resolves the issue, along with additional backports [3]. Users should update to the latest stable kernel that includes the fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
8aa017ab5716c586801352229954a7a0011d9d562054a3a2e0f735f232ff5dbef00ef4b9b3c40b34e3462c818ae563bf9Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/0f735f232ff59863e0b6ebac0849d637e215a9c2nvd
- git.kernel.org/stable/c/3c40b34e3462aab12af3dba77d2e1602afc72e80nvd
- git.kernel.org/stable/c/5868013522297bf628eee4322d99d6d4de4f308envd
- git.kernel.org/stable/c/954a7a0011d94475f8ba5ceb77a5d11e01cf402fnvd
- git.kernel.org/stable/c/aa017ab5716c9157c65fdce061c4a4a568af53a8nvd
- git.kernel.org/stable/c/c818ae563bf99457f02e8170aabd6b174f629f65nvd
- git.kernel.org/stable/c/d562054a3a2eede3507a5461011ee82b671fcb88nvd
- git.kernel.org/stable/c/dbef00ef4b9b98d15183340396e5df0fa7a860d8nvd
News mentions
0No linked articles in our index yet.