VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54003

CVE-2023-54003

Description

In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Fix GID entry ref leak when create_ah fails

If AH create request fails, release sgid_attr to avoid GID entry referrence leak reported while releasing GID table

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

When create_ah fails in the Linux kernel RDMA core, a GID entry reference leak occurs because sgid_attr is not released, leading to memory resource exhaustion.

Vulnerability

Analysis

CVE-2023-54003 is a reference leak vulnerability in the Linux kernel's RDMA (Remote Direct Memory Access) core. The root cause is a missing release of the sgid_attr when an Address Handle (AH) creation request fails. Each successful GID entry lookup increments a reference count on the corresponding GID table entry; if create_ah fails without releasing that reference, a leak occurs. This leak accumulates over time as failed AH creation attempts are repeated.

Exploitation and

Attack Surface

The vulnerability is triggered during the normal creation of an Address Handle, which is a fundamental operation in RDMA communication. An attacker with the ability to induce repeated AH creation failures—for example, by providing invalid parameters or exploiting a race condition—can cause the GID table entry reference count to remain elevated. This does not require special privileges beyond having access to RDMA device operations, but local access is typically needed.

Impact

An attacker who can cause repeated AH creation failures can exhaust the GID table entry reference counters. Once the reference leak is sufficiently large, the GID entry cannot be freed even after legitimate use ends. This may lead to resource exhaustion, preventing new RDMA connections or causing a denial of service (DoS) condition on the affected system. In extreme cases, memory pressure from unreleased entries could impact overall system stability.

Mitigation

The fix has been applied in the Linux kernel stable tree, as seen in commit references [1] and [2]. System administrators should update to a kernel version containing this fix. There is no known workaround other than applying the patch or upgrading the kernel.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

6

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.