VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2023-54205

CVE-2023-54205

Description

In the Linux kernel, the following vulnerability has been resolved:

pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain

of_irq_find_parent() returns a node pointer with refcount incremented, We should use of_node_put() on it when not needed anymore. Add missing of_node_put() to avoid refcount leak.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2023-54205 is a refcount leak in the Linux kernel's STM32 pinctrl driver, where of_irq_find_parent() incremented a node reference without a corresponding of_node_put().

Root

Cause In the Linux kernel's STM32 pinctrl driver, the function stm32_pctrl_get_irq_domain calls of_irq_find_parent(), which returns a device node pointer with its node pointer with an incremented reference count. The driver failed to call of_node_put() after using the node, leading to a reference count leak. This is a classic memory management bug that can cause the device node to remain pinned indefinitely.

Exploitation

An attacker with local access and the ability to trigger the affected code path to does not require any special privileges beyond system access. The bug is present when the probing of the STM32 pin controller and when interrupt domain retrieval occurs no authentication beyond local user privileges is . Repeated operations that cause that might exhaust system memory via an effective denial of service.

Impact

The primary impact is a memory leak, which can gradually degrade system performance and stability if exploited repeatedly. In the worst case, it could lead to denial of service (DoS) by exhausting kernel memory, there is no remote exploit vector or direct privilege escalation.

Mitigation

The vulnerability is fixed by adding the missing of_node_put() call, introduced by the Linux kernel commits [1] and [2]. Users should apply updates from their distribution or kernel vendor as soon as possible to prevent resource exhaustion.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

6

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.