Description
In the Linux kernel, the following vulnerability has been resolved:

pinctrl: pinconf-generic: Fix memory leak in pinconf_generic_parse_dt_config()

In pinconf_generic_parse_dt_config(), if parse_dt_cfg() fails, it returns
directly. This bypasses the cleanup logic and results in a memory leak of
the cfg buffer.

Fix this by jumping to the out label on failure, ensuring kfree(cfg) is
called before returning.
Published: 2026-03-25
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

The kernel function pinconf_generic_parse_dt_config() incorrectly skips cleanup when parse_dt_cfg() fails, causing the cfg buffer to leak memory. If repeatedly triggered, this can exhaust system RAM and destabilize or crash the affected system.

Affected Systems

The flaw resides in the Linux kernel pinctrl subsystem, affecting all Linux kernel builds that include the generic pinconf driver. Vendor or distribution kernel packages containing this code are potentially impacted. No specific kernel release versions are listed, so all affected images should be reviewed.

Risk and Exploitability

The CVSS score is not provided, but the EPSS score is below 1%, suggesting a low likelihood of exploitation. The vulnerability is not in the CISA KEV catalog and does not provide direct code‑execution or privilege‑escalation paths, making it a low‑severity memory‑leak that could lead to resource exhaustion in a local or privileged context. Nonetheless, because it affects kernel memory management, it should be treated with caution and patched in a timely manner.

Generated by OpenCVE AI on March 26, 2026 at 13:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel version that contains the pinctrl memory‑leak fix (commit 63ee4297 or the corresponding release).
  • If using a custom kernel, rebuild with the patch applied or cherry‑pick the commit into your branch.
  • Verify that systems are running the updated kernel and that the leak no longer occurs by checking dmesg or kernel logs for repeated failures from pinconf_parse_dt_cfg.
  • No temporary workaround is available; keep the system up‑to‑date and monitor for repeated failures.

Generated by OpenCVE AI on March 26, 2026 at 13:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401
CPEs cpe:2.3:o:linux:linux_kernel:6.19:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Thu, 26 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-772
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Wed, 25 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: pinctrl: pinconf-generic: Fix memory leak in pinconf_generic_parse_dt_config() In pinconf_generic_parse_dt_config(), if parse_dt_cfg() fails, it returns directly. This bypasses the cleanup logic and results in a memory leak of the cfg buffer. Fix this by jumping to the out label on failure, ensuring kfree(cfg) is called before returning.
Title pinctrl: pinconf-generic: Fix memory leak in pinconf_generic_parse_dt_config()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:05:18.836Z

Reserved: 2026-01-13T15:37:45.997Z

Link: CVE-2026-23337

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T11:16:31.413

Modified: 2026-04-23T21:17:34.017

Link: CVE-2026-23337

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-25T00:00:00Z

Links: CVE-2026-23337 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:49:37Z

Weaknesses