CVE-2023-54205
Description
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain
of_irq_find_parent() returns a node pointer with refcount incremented, We should use of_node_put() on it when not needed anymore. Add missing of_node_put() to avoid refcount leak.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2023-54205 is a refcount leak in the Linux kernel's STM32 pinctrl driver, where of_irq_find_parent() incremented a node reference without a corresponding of_node_put().
Root
Cause In the Linux kernel's STM32 pinctrl driver, the function stm32_pctrl_get_irq_domain calls of_irq_find_parent(), which returns a device node pointer with its node pointer with an incremented reference count. The driver failed to call of_node_put() after using the node, leading to a reference count leak. This is a classic memory management bug that can cause the device node to remain pinned indefinitely.
Exploitation
An attacker with local access and the ability to trigger the affected code path to does not require any special privileges beyond system access. The bug is present when the probing of the STM32 pin controller and when interrupt domain retrieval occurs no authentication beyond local user privileges is . Repeated operations that cause that might exhaust system memory via an effective denial of service.
Impact
The primary impact is a memory leak, which can gradually degrade system performance and stability if exploited repeatedly. In the worst case, it could lead to denial of service (DoS) by exhausting kernel memory, there is no remote exploit vector or direct privilege escalation.
Mitigation
The vulnerability is fixed by adding the missing of_node_put() call, introduced by the Linux kernel commits [1] and [2]. Users should apply updates from their distribution or kernel vendor as soon as possible to prevent resource exhaustion.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
695ab6d7905eb8ab860dd8717af54707c0cca601be03fa8b89ae053d1eb87dcef18c8ac40Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/601be03fa8b81747a154bdef9b559411a5b921e8nvd
- git.kernel.org/stable/c/8ab860dd8717a7e4a143988885fea0d7e5a9412envd
- git.kernel.org/stable/c/95ab6d7905ebb52dc2ed6357c38e536753824068nvd
- git.kernel.org/stable/c/9ae053d1eb87875d56f95b6a123a69827225a70envd
- git.kernel.org/stable/c/af54707c0ccab52b3d532402436ea101011a9299nvd
- git.kernel.org/stable/c/dcef18c8ac40aa85bb339f64c1dd31dd458b06fbnvd
News mentions
0No linked articles in our index yet.