Impact
The kernel function pinconf_generic_parse_dt_config() incorrectly skips cleanup when parse_dt_cfg() fails, causing the cfg buffer to leak memory. If repeatedly triggered, this can exhaust system RAM and destabilize or crash the affected system.
Affected Systems
The flaw resides in the Linux kernel pinctrl subsystem, affecting all Linux kernel builds that include the generic pinconf driver. Vendor or distribution kernel packages containing this code are potentially impacted. No specific kernel release versions are listed, so all affected images should be reviewed.
Risk and Exploitability
The CVSS score is not provided, but the EPSS score is below 1%, suggesting a low likelihood of exploitation. The vulnerability is not in the CISA KEV catalog and does not provide direct code‑execution or privilege‑escalation paths, making it a low‑severity memory‑leak that could lead to resource exhaustion in a local or privileged context. Nonetheless, because it affects kernel memory management, it should be treated with caution and patched in a timely manner.
OpenCVE Enrichment