VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54106

CVE-2023-54106

Description

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: fix potential memory leak in mlx5e_init_rep_rx

The memory pointed to by the priv->rx_res pointer is not freed in the error path of mlx5e_init_rep_rx, which can lead to a memory leak. Fix by freeing the memory in the error path, thereby making the error path identical to mlx5e_cleanup_rep_rx().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing kfree in the error path of mlx5e_init_rep_rx in the Linux kernel can lead to a memory leak of priv->rx_res.

Root

Cause In the Linux kernel's net/mlx5 driver, the function mlx5e_init_rep_rx allocates memory for priv->rx_res. However, in the error path, this allocated memory is not freed, unlike the cleanup function mlx5e_cleanup_rep_rx() which does free it. This discrepancy creates a potential memory leak.

Exploitation

An attacker would need to trigger an error condition within mlx5e_init_rep_rx (e.g., by inducing a failure in a subsequent allocation or setup step). No special privileges are required beyond being able to interact with the mlx5 network device driver, but the attack surface is limited to systems using this hardware. The exploit would not require user interaction; it is triggered by the kernel's internal error handling.

Impact

If triggered, each error path leak consumes kernel memory. Repeated exploitation could exhaust system memory, leading to denial of service (DoS). There is no evidence of code execution or privilege escalation from this bug alone.

Mitigation

The fix has been applied in the Linux kernel stable commit c265d8c2e255 [1]. Users should update to a kernel version containing this commit or a subsequent release that includes the backport. The fix ensures the error path frees priv->rx_res identically to the cleanup function.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.