CVE-2023-54319
Description
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: at91-pio4: check return value of devm_kasprintf()
devm_kasprintf() returns a pointer to dynamically allocated memory. Pointer could be NULL in case allocation fails. Check pointer validity. Identified with coccinelle (kmerr.cocci script).
Depends-on: 1c4e5c470a56 ("pinctrl: at91: use devm_kasprintf() to avoid potential leaks") Depends-on: 5a8f9cf269e8 ("pinctrl: at91-pio4: use proper format specifier for unsigned int")
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's pinctrl-at91-pio4 driver, a missing NULL check on devm_kasprintf() could lead to a NULL pointer dereference, causing a denial of service.
Vulnerability
In the Linux kernel's pinctrl-at91-pio4 driver, the function devm_kasprintf() is called without checking its return value. This function allocates memory dynamically and can return NULL if the allocation fails. The missing check could lead to a NULL pointer dereference when the returned pointer is subsequently used.
Exploitation
An attacker with the ability to trigger a memory allocation failure (e.g., via exhausting system memory) could cause the driver to dereference a NULL pointer. This would likely result in a kernel crash, denying service to legitimate users. No special privileges are required if the attacker can influence memory pressure.
Impact
Successful exploitation results in a denial of service (system crash). This is a low-severity issue that requires local access or a specific system condition to trigger.
Mitigation
The fix was applied in commit [1] and included in subsequent stable kernel releases. Users should update their kernels to a version containing this patch.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
98d788f2ba8303e8ce1d5a1a9aa3932eb0739f3c7b95c99910a95dd17a73b0af388fce3525bfd577cc7288a1fa202f47ff6fd5d4ff8caVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
9- git.kernel.org/stable/c/0a95dd17a73b7603818ad7c46c99d757232be331nvd
- git.kernel.org/stable/c/0af388fce352ed2ab383fd5d1a08db551ca15c38nvd
- git.kernel.org/stable/c/3e8ce1d5a1a9d758b359e5c426543957f35991f8nvd
- git.kernel.org/stable/c/5bfd577cc728270d6cd7af6c652a1e7661f25487nvd
- git.kernel.org/stable/c/8a1fa202f47f39680a4305af744f499a324f8a03nvd
- git.kernel.org/stable/c/8d788f2ba830d6d32499b198c526d577c590eedfnvd
- git.kernel.org/stable/c/aa3932eb07392d626486428e2ffddc660658e22anvd
- git.kernel.org/stable/c/f3c7b95c9991dab02e616fc251b6c3516e0bd0acnvd
- git.kernel.org/stable/c/f6fd5d4ff8ca0b24cee1af4130bcb1fa96b61aa0nvd
News mentions
0No linked articles in our index yet.