Description
In the Linux kernel, the following vulnerability has been resolved:

soc: microchip: mpfs: Fix memory leak in mpfs_sys_controller_probe()

In mpfs_sys_controller_probe(), if of_get_mtd_device_by_node() fails,
the function returns immediately without freeing the allocated memory
for sys_controller, leading to a memory leak.

Fix this by jumping to the out_free label to ensure the memory is
properly freed.

Also, consolidate the error handling for the mbox_request_channel()
failure case to use the same label.
Published: 2026-04-03
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via memory exhaustion
Action: Patch
AI Analysis

Impact

In the Linux kernel, initializing the MPFS driver allocates a sys_controller structure. If the call to of_get_mtd_device_by_node fails, the function returns without freeing the allocation, creating a memory leak. Over time, repeated failures can exhaust kernel memory, potentially causing a kernel panic or degraded performance. This flaw is a resource‑exhaustion vulnerability (CWE‑772) and does not give an attacker code execution or data disclosure capabilities.

Affected Systems

Any installation of the Linux kernel that incorporates the Microchip MPFS system controller driver is affected. The vulnerability is not tied to a specific kernel version; therefore, all kernels that still contain the vulnerable code should be updated. Administrators should verify whether their deployments include MPFS support and whether the recent patch commit has been applied.

Risk and Exploitability

The EPSS score is below 1% and the vulnerability is not listed in the CISA KEV catalog, indicating a low likelihood of exploitation. Based on the description, the likely attack vector is local and would require an attacker who can trigger the driver’s initialization with a device tree node that causes of_get_mtd_device_by_node to fail. The impact is limited to service availability, with no data compromise or privilege escalation. The resource exhaustion could affect overall system stability, so the risk is moderate but the recommended response is prompt patching.

Generated by OpenCVE AI on April 7, 2026 at 10:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that contains the mpfs_sys_controller_probe memory leak patch or apply the patch commit directly to the source
  • Reboot the system to unload and reload the MPFS driver and confirm the patch is in effect
  • Verify through dmesg or kernel logs that no further memory leaks occur during MPFS driver initialization
  • Monitor system memory usage for abnormal growth to ensure the leak has been fully resolved

Generated by OpenCVE AI on April 7, 2026 at 10:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6238-1 linux security update
History

Tue, 07 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Sat, 04 Apr 2026 01:15:00 +0000


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: soc: microchip: mpfs: Fix memory leak in mpfs_sys_controller_probe() In mpfs_sys_controller_probe(), if of_get_mtd_device_by_node() fails, the function returns immediately without freeing the allocated memory for sys_controller, leading to a memory leak. Fix this by jumping to the out_free label to ensure the memory is properly freed. Also, consolidate the error handling for the mbox_request_channel() failure case to use the same label.
Title soc: microchip: mpfs: Fix memory leak in mpfs_sys_controller_probe()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:07:58.722Z

Reserved: 2026-01-13T15:37:46.021Z

Link: CVE-2026-23464

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-03T16:16:33.697

Modified: 2026-04-07T13:20:55.200

Link: CVE-2026-23464

cve-icon Redhat

Severity :

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23464 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:53:42Z

Weaknesses