VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54015

CVE-2023-54015

Description

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device

In case devcom allocation is failed, mlx5 is always freeing the priv. However, this priv might have been allocated by a different thread, and freeing it might lead to use-after-free bugs. Fix it by freeing the priv only in case it was allocated by the running thread.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A use-after-free vulnerability in mlx5_devcom_register_device when devcom allocation fails leads to incorrect priv freeing.

Vulnerability

Analysis

In the Linux kernel's net/mlx5 driver, the function mlx5_devcom_register_device contains a critical error in its failure path. When devcom allocation fails, the code unconditionally frees the priv structure. However, this priv may have been allocated by a different thread, and freeing it incorrectly can cause a use-after-free condition [1][2].

Exploitation

The vulnerability arises during device registration in the Mellanox (now Nvidia) mlx5 network driver. An attacker would need to trigger a devcom allocation failure, potentially through resource exhaustion or specific race conditions. The incorrect error handling then frees memory that might still be in use by another thread [1][3].

Impact

A local attacker with sufficient privileges could exploit this bug to cause a use-after-free, leading to kernel memory corruption. This could result in a denial of service (system crash) or potentially allow privilege escalation, as use-after-free flaws in kernel drivers are often leveraged for arbitrary code execution in the kernel context [2][3].

Mitigation

The fix, which has been applied to the stable kernel tree, ensures that priv is freed only if it was allocated by the current thread. Users should update their Linux kernel to a version containing the commit addressing this issue [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

6

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.