VYPR
Unrated severityNVD Advisory· Published Oct 22, 2025· Updated Apr 15, 2026

CVE-2023-53697

CVE-2023-53697

Description

In the Linux kernel, the following vulnerability has been resolved:

nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu()

Memory pointed by 'nd_pmu->pmu.attr_groups' is allocated in function 'register_nvdimm_pmu' and is lost after 'kfree(nd_pmu)' call in function 'unregister_nvdimm_pmu'.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in the Linux kernel's NVDIMM PMU subsystem occurs when unregistering a PMU device, as the allocated attr_groups pointer is not freed before kfree(nd_pmu).

Vulnerability

Overview

CVE-2023-53697 is a memory leak vulnerability in the Linux kernel's NVDIMM (Non-Volatile Dual In-line Memory Module) subsystem. The issue resides in the unregister_nvdimm_pmu() function, where the memory allocated for nd_pmu->pmu.attr_groups during register_nvdimm_pmu() is not properly freed before the nd_pmu structure is deallocated via kfree(nd_pmu). This results in a memory leak, as the pointer to the allocated memory is lost without being released [1][2].

Exploitation and

Attack Surface

This vulnerability is triggered during the normal operation of unloading or removing an NVDIMM PMU (Performance Monitoring Unit) device. No special privileges beyond the ability to trigger device removal are required; however, the attack surface is limited to systems that utilize NVDIMM hardware and the associated kernel driver. An attacker with local access or the ability to cause device hot-unplug events could repeatedly trigger the leak, potentially exhausting system memory over time.

Impact

An attacker who can repeatedly trigger the unregister path may cause a gradual depletion of kernel memory, leading to denial of service (DoS) conditions. The leak does not directly allow arbitrary code execution or privilege escalation, but sustained exploitation could degrade system performance or cause instability.

Mitigation

The fix is included in Linux kernel stable updates. Patched versions are available via the kernel git repositories referenced in the CVE [1][2]. Users should update to a kernel version containing the commit that properly frees attr_groups before freeing nd_pmu. No workaround is available; updating the kernel is the recommended mitigation.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.