CVE-2023-54190
Description
In the Linux kernel, the following vulnerability has been resolved:
leds: led-core: Fix refcount leak in of_led_get()
class_find_device_by_of_node() calls class_find_device(), it will take the reference, use the put_device() to drop the reference when not need anymore.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
of_led_get() in the Linux kernel's LED subsystem leaks a device reference count references via class_find_device_of_node() without a matching put_device().
Root
Cause of_led_get() in the Linux kernel's LED core uses class_findirectly leaks a reference count by calling class_find_device_by_of_node(). That helper itself invokes class_find_device(), which increments the reference count of the returned device. The callerre was never calling put_device() to decrement that count after using the device, causing a persistent reference leak.
Exploitation
Prerequisites To exploit this leak, an attacker would need to repeatedly trigger code path that calls of_led_get() — for example, by repeatedly probing or registering LED device that matches a Device Tree node. No special privileges beyond the ability to control system behavior (e.g., hot‑plugging an LED device or loading/unloading a driver) are required; the leak occurs in standard kernel APIs accessible to user space indirectly.
Impact
Each redundant the reference leak does not directly cause memory corruption or privilege escalation. Over time, repeated calls to of_led_get() will permanently consume kobject references, preventing the underlying device structures from being freed. This can lead to kernel memory exhaustion (OOM) and system instability, effectively a denial‑of‑service (DoS) condition.
Mitigation
The fix requires a single put_device() call after class_find_device_by_of_node() returns a non‑NULL device. The Linux kernel stable tree has already applied the patch (see [1], [2]). Administrators should update to a kernel version that includes the commit or backport the fix. No workaround exists other than applying the kernel update.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
51d6101d9222e690efcb5827cd880981b8222ddf3e82164afda1afe8e6099Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/1d6101d9222e1ca8c01b3fa9ebf0dcf7bcd82564nvd
- git.kernel.org/stable/c/690efcb5827c3bacbf1de90cd14907b91bf8cb7bnvd
- git.kernel.org/stable/c/d880981b82223f9bf128dfdd2424abb0c658f345nvd
- git.kernel.org/stable/c/da1afe8e6099980fe1e2fd7436dca284af9d3f29nvd
- git.kernel.org/stable/c/ddf3e82164afd9381b1d52c9f00b3878f7b6d308nvd
News mentions
0No linked articles in our index yet.