CVE-2023-54205

Source
https://cve.org/CVERecord?id=CVE-2023-54205
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54205.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54205
Downstream
Related
Published
2025-12-30T12:11:05.295Z
Modified
2026-03-20T12:33:29.743991Z
Summary
pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain
Details

In the Linux kernel, the following vulnerability has been resolved:

pinctrl: stm32: Fix refcount leak in stm32pctrlgetirqdomain

ofirqfindparent() returns a node pointer with refcount incremented, We should use ofnodeput() on it when not needed anymore. Add missing ofnode_put() to avoid refcount leak.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54205.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d86f4d71e42a9fa1866f030074e54d7571d16ec1
Fixed
95ab6d7905ebb52dc2ed6357c38e536753824068
Fixed
8ab860dd8717a7e4a143988885fea0d7e5a9412e
Fixed
af54707c0ccab52b3d532402436ea101011a9299
Fixed
601be03fa8b81747a154bdef9b559411a5b921e8
Fixed
9ae053d1eb87875d56f95b6a123a69827225a70e
Fixed
dcef18c8ac40aa85bb339f64c1dd31dd458b06fb

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54205.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.2.0
Fixed
5.4.235
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.173
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.99
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.16
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54205.json"