VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2023-54319

CVE-2023-54319

Description

In the Linux kernel, the following vulnerability has been resolved:

pinctrl: at91-pio4: check return value of devm_kasprintf()

devm_kasprintf() returns a pointer to dynamically allocated memory. Pointer could be NULL in case allocation fails. Check pointer validity. Identified with coccinelle (kmerr.cocci script).

Depends-on: 1c4e5c470a56 ("pinctrl: at91: use devm_kasprintf() to avoid potential leaks") Depends-on: 5a8f9cf269e8 ("pinctrl: at91-pio4: use proper format specifier for unsigned int")

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's pinctrl-at91-pio4 driver, a missing NULL check on devm_kasprintf() could lead to a NULL pointer dereference, causing a denial of service.

Vulnerability

In the Linux kernel's pinctrl-at91-pio4 driver, the function devm_kasprintf() is called without checking its return value. This function allocates memory dynamically and can return NULL if the allocation fails. The missing check could lead to a NULL pointer dereference when the returned pointer is subsequently used.

Exploitation

An attacker with the ability to trigger a memory allocation failure (e.g., via exhausting system memory) could cause the driver to dereference a NULL pointer. This would likely result in a kernel crash, denying service to legitimate users. No special privileges are required if the attacker can influence memory pressure.

Impact

Successful exploitation results in a denial of service (system crash). This is a low-severity issue that requires local access or a specific system condition to trigger.

Mitigation

The fix was applied in commit [1] and included in subsequent stable kernel releases. Users should update their kernels to a version containing this patch.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

9

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

9

News mentions

0

No linked articles in our index yet.