CVE-2023-54230
Description
In the Linux kernel, the following vulnerability has been resolved:
amba: bus: fix refcount leak
commit 5de1540b7bc4 ("drivers/amba: create devices from device tree") increases the refcount of of_node, but not releases it in amba_device_release, so there is refcount leak. By using of_node_put to avoid refcount leak.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A refcount leak in the Linux kernel's amba bus driver for device tree nodes can lead to memory resource exhaustion.
Vulnerability
Description
CVE-2023-54230 is a refcount leak vulnerability in the Linux kernel's AMBA bus driver. The commit 5de1540b7bc4 ("drivers/amba: create devices from device tree") introduced a code path that increases the reference count of the device tree node (of_node) but fails to decrement it in the amba_device_release function [1]. This oversight causes the reference count to remain elevated after the device is released, resulting in a memory leak of the device tree node object.
Exploitation
The vulnerability is triggered during the lifecycle of AMBA devices that are created from device tree entries. As these devices are added and removed, each time an AMBA device associated with a device tree node is released without properly putting the node, the reference count increments without a corresponding decrement. An attacker cannot directly trigger this from userspace without prerequisites, as the leak occurs through normal kernel device management; however, any system that dynamically adds/removes AMBA devices or uses device tree overlays could accumulate the leak over time.
Impact
A successful exploitation would result in a gradual exhaustion of kernel memory due to the unreleased device tree node objects. Over an extended period of system uptime and repeated device hotplug operations, this could lead to denial of service (DoS) via memory exhaustion. The impact is limited to availability, with no evidence of privilege escalation or information disclosure. The vulnerability does not require special privileges to be triggered, as it arises from normal kernel operations.
Mitigation
The fix has been applied in upstream stable kernel commits [1][2][3][4], which add a call to of_node_put in amba_device_release to properly balance the reference count. Users are advised to update to a kernel version containing these commits or apply the respective stable backports. No workaround is available, and the issue does not appear on the CISA KEV list.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
994e398df32e89062ce0ccbd803db4fe7917b9baf2278b3ee4f1807fddd9b81ff633a88be206fadb7278c8b60a706166de312cbdc1130Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
9- git.kernel.org/stable/c/03db4fe7917bb160eeccf3968835475fa32b7e10nvd
- git.kernel.org/stable/c/206fadb7278ceac7593dd0b945a77b9df856a674nvd
- git.kernel.org/stable/c/4f1807fddd9bf175ee5e14fffc6b6106e4b297efnvd
- git.kernel.org/stable/c/81ff633a88be2482c163d3acd2801d501261ce6anvd
- git.kernel.org/stable/c/8b60a706166de5de82314494704c2419e7657bf8nvd
- git.kernel.org/stable/c/9062ce0ccbd82fbe81cc839a512c0ad90847e01cnvd
- git.kernel.org/stable/c/94e398df32e850f26828690ee62f7441979583ccnvd
- git.kernel.org/stable/c/9baf2278b3eed2c50112169121257d8a6ee0606cnvd
- git.kernel.org/stable/c/e312cbdc11305568554a9e18a2ea5c2492c183f3nvd
News mentions
0No linked articles in our index yet.