Description
In the Linux kernel, the following vulnerability has been resolved:

regulator: bq257xx: Fix device node reference leak in bq257xx_reg_dt_parse_gpio()

In bq257xx_reg_dt_parse_gpio(), if fails to get subchild, it returns
without calling of_node_put(child), causing the device node reference
leak.
Published: 2026-03-25
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reference Leak Leading to Resource Exhaustion
Action: Immediate Patch
AI Analysis

Impact

In the Linux kernel's regulator driver for the bq257xx family, a bug in the function bq257xx_reg_dt_parse_gpio() causes the driver to skip the release of a child node reference when a required subchild cannot be retrieved. This reference leak can accumulate with repeated parsing events, eventually exhausting kernel memory and causing system instability or denial of service. The weakness is a classic reference‑counting error, classified as CWE‑772.

Affected Systems

The vulnerability affects all Linux kernel builds that include the bq257xx regulator source code without the recent fix. This includes mainstream distributions and embedded platforms that rely on this driver. No specific version range is provided, so any kernel that predates the commit that introduced the patch is considered vulnerable.

Risk and Exploitability

The EPSS score is less than 1 percent, indicating a low probability of active exploitation in the wild. The vulnerability is not listed in CISA's KEV catalog, so no confirmed exploits exist. Based on the description, it is inferred that an attacker would need local or privileged access to influence the device tree parsing logic, for example by providing a manipulated firmware image or device tree node that triggers repeated parsing. By exhausting kernel resources, the attacker could force a denial‑of‑service condition over time. The risk is consequently moderate, and reliance on the patched kernel offers robust protection.

Generated by OpenCVE AI on March 26, 2026 at 04:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the bq257xx regulator reference‑leak fix (commit 4baaddaa44af01cd4ce239493060738fd0881835).
  • Verify that the current kernel contains the commit by checking the driver source or using the package version identifier.
  • If a kernel upgrade cannot be performed immediately, consider disabling or removing the bq257xx regulator entry from the device tree until a patched kernel is available.
  • Monitor kernel security advisories and distribution release notes for updates related to this vulnerability and any subsequent patches.

Generated by OpenCVE AI on March 26, 2026 at 04:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:o:linux:linux_kernel:6.18:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Thu, 26 Mar 2026 00:15:00 +0000


Wed, 25 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: regulator: bq257xx: Fix device node reference leak in bq257xx_reg_dt_parse_gpio() In bq257xx_reg_dt_parse_gpio(), if fails to get subchild, it returns without calling of_node_put(child), causing the device node reference leak.
Title regulator: bq257xx: Fix device node reference leak in bq257xx_reg_dt_parse_gpio()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:04:12.991Z

Reserved: 2026-01-13T15:37:45.994Z

Link: CVE-2026-23314

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T11:16:27.767

Modified: 2026-04-23T21:06:50.930

Link: CVE-2026-23314

cve-icon Redhat

Severity :

Publid Date: 2026-03-25T00:00:00Z

Links: CVE-2026-23314 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:16:43Z

Weaknesses