CVE-2023-54003
Description
In the Linux kernel, the following vulnerability has been resolved:
RDMA/core: Fix GID entry ref leak when create_ah fails
If AH create request fails, release sgid_attr to avoid GID entry referrence leak reported while releasing GID table
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
When create_ah fails in the Linux kernel RDMA core, a GID entry reference leak occurs because sgid_attr is not released, leading to memory resource exhaustion.
Vulnerability
Analysis
CVE-2023-54003 is a reference leak vulnerability in the Linux kernel's RDMA (Remote Direct Memory Access) core. The root cause is a missing release of the sgid_attr when an Address Handle (AH) creation request fails. Each successful GID entry lookup increments a reference count on the corresponding GID table entry; if create_ah fails without releasing that reference, a leak occurs. This leak accumulates over time as failed AH creation attempts are repeated.
Exploitation and
Attack Surface
The vulnerability is triggered during the normal creation of an Address Handle, which is a fundamental operation in RDMA communication. An attacker with the ability to induce repeated AH creation failures—for example, by providing invalid parameters or exploiting a race condition—can cause the GID table entry reference count to remain elevated. This does not require special privileges beyond having access to RDMA device operations, but local access is typically needed.
Impact
An attacker who can cause repeated AH creation failures can exhaust the GID table entry reference counters. Once the reference leak is sufficiently large, the GID entry cannot be freed even after legitimate use ends. This may lead to resource exhaustion, preventing new RDMA connections or causing a denial of service (DoS) condition on the affected system. In extreme cases, memory pressure from unreleased entries could impact overall system stability.
Mitigation
The fix has been applied in the Linux kernel stable tree, as seen in commit references [1] and [2]. System administrators should update to a kernel version containing this fix. There is no known workaround other than applying the patch or upgrading the kernel.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
69c46c49ad3ffd1b9b3191697e97ff11b396c370280c65c28632d6baf8884aca3b0fa3d04Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/370280c65c28a515b841c9f2c08524f06182510cnvd
- git.kernel.org/stable/c/632d6baf8884d803e598bf5164008d23fd9b736cnvd
- git.kernel.org/stable/c/9c46c49ad3ffe84121715d392b5a0a94f9f10669nvd
- git.kernel.org/stable/c/aca3b0fa3d04b40c96934d86cc224cccfa7ea8e0nvd
- git.kernel.org/stable/c/d1b9b3191697a80aca8e247320eba46f24d41d18nvd
- git.kernel.org/stable/c/e97ff11b396c320d2cc025b09741ba432fcb20a2nvd
News mentions
0No linked articles in our index yet.