VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54123

CVE-2023-54123

Description

In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix memleak for 'conf->bio_split'

In the error path of raid10_run(), 'conf' need be freed, however, 'conf->bio_split' is missed and memory will be leaked.

Since there are 3 places to free 'conf', factor out a helper to fix the problem.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in the Linux kernel's md/raid10 driver occurs when 'conf->bio_split' is not freed in the error path of raid10_run(), leading to potential resource exhaustion.

Vulnerability

Description

CVE-2023-54123 is a memory leak vulnerability in the Linux kernel's md/raid10 driver. The issue arises in the raid10_run() function, where during error handling, the conf structure is freed but the conf->bio_split member is not properly deallocated, causing [1] a memory leak. The kernel's official message confirms that there are three places where conf is freed, and a helper function was introduced to ensure all allocated resources, including bio_split, are correctly released [1].

Exploitation and

Impact

This vulnerability is triggered during the initialization of a RAID10 array when an error occurs in raid10_run(). An attacker with the ability to cause such an error (e.g., by providing invalid parameters or triggering a device failure) could repeatedly exploit this to exhaust system memory, leading to a denial-of-service condition. No authentication is required if the attacker can influence the RAID configuration, but local access or privileged capabilities are typically needed to manage MD devices.

Mitigation

The fix was applied to the Linux kernel stable tree in commit 133008af833b [1] and backported to other stable versions [2][3][4]. Users should update their kernel to include the patched version. No workaround is available other than applying the kernel patch [1] or avoiding the use of RAID10 in error-prone scenarios until patched.", "citations": [1, 2, 3, 4] } ```

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.