CVE-2023-54106
Description
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: fix potential memory leak in mlx5e_init_rep_rx
The memory pointed to by the priv->rx_res pointer is not freed in the error path of mlx5e_init_rep_rx, which can lead to a memory leak. Fix by freeing the memory in the error path, thereby making the error path identical to mlx5e_cleanup_rep_rx().
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A missing kfree in the error path of mlx5e_init_rep_rx in the Linux kernel can lead to a memory leak of priv->rx_res.
Root
Cause In the Linux kernel's net/mlx5 driver, the function mlx5e_init_rep_rx allocates memory for priv->rx_res. However, in the error path, this allocated memory is not freed, unlike the cleanup function mlx5e_cleanup_rep_rx() which does free it. This discrepancy creates a potential memory leak.
Exploitation
An attacker would need to trigger an error condition within mlx5e_init_rep_rx (e.g., by inducing a failure in a subsequent allocation or setup step). No special privileges are required beyond being able to interact with the mlx5 network device driver, but the attack surface is limited to systems using this hardware. The exploit would not require user interaction; it is triggered by the kernel's internal error handling.
Impact
If triggered, each error path leak consumes kernel memory. Repeated exploitation could exhaust system memory, leading to denial of service (DoS). There is no evidence of code execution or privilege escalation from this bug alone.
Mitigation
The fix has been applied in the Linux kernel stable commit c265d8c2e255 [1]. Users should update to a kernel version containing this commit or a subsequent release that includes the backport. The fix ensures the error path frees priv->rx_res identically to the cleanup function.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
30582a3caaa3ec265d8c2e255c6cf0b6097bfVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.