CVE-2023-54123
Description
In the Linux kernel, the following vulnerability has been resolved:
md/raid10: fix memleak for 'conf->bio_split'
In the error path of raid10_run(), 'conf' need be freed, however, 'conf->bio_split' is missed and memory will be leaked.
Since there are 3 places to free 'conf', factor out a helper to fix the problem.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in the Linux kernel's md/raid10 driver occurs when 'conf->bio_split' is not freed in the error path of raid10_run(), leading to potential resource exhaustion.
Vulnerability
Description
CVE-2023-54123 is a memory leak vulnerability in the Linux kernel's md/raid10 driver. The issue arises in the raid10_run() function, where during error handling, the conf structure is freed but the conf->bio_split member is not properly deallocated, causing [1] a memory leak. The kernel's official message confirms that there are three places where conf is freed, and a helper function was introduced to ensure all allocated resources, including bio_split, are correctly released [1].
Exploitation and
Impact
This vulnerability is triggered during the initialization of a RAID10 array when an error occurs in raid10_run(). An attacker with the ability to cause such an error (e.g., by providing invalid parameters or triggering a device failure) could repeatedly exploit this to exhaust system memory, leading to a denial-of-service condition. No authentication is required if the attacker can influence the RAID configuration, but local access or privileged capabilities are typically needed to manage MD devices.
Mitigation
The fix was applied to the Linux kernel stable tree in commit 133008af833b [1] and backported to other stable versions [2][3][4]. Users should update their kernel to include the patched version. No workaround is available other than applying the kernel patch [1] or avoiding the use of RAID10 in error-prone scenarios until patched.", "citations": [1, 2, 3, 4] } ```
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
8133008af833bb6460f68c1cc6361b0592b467f673fa34c0eb21019a220d95cba3e26c073e2fec8d95353c9ac2acde53fVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/133008af833b4f2e021d2c294c29c70364a3f0banvd
- git.kernel.org/stable/c/5cba3e26c073b535e4e3b825ea481fb29c53943bnvd
- git.kernel.org/stable/c/6361b0592b46c465ac926c1f3105d66c30d9658bnvd
- git.kernel.org/stable/c/7f673fa34c0e3f95ee951a1bbf61791164871d2envd
- git.kernel.org/stable/c/b21019a220d9cac08819bb6c63000de9ee61eb9envd
- git.kernel.org/stable/c/b6460f68c1cc95a80d089af402be501619f228e4nvd
- git.kernel.org/stable/c/c9ac2acde53f5385de185bccf6aaa91cf9ac1541nvd
- git.kernel.org/stable/c/e2fec8d95353a48634b085011626ba3ec8ab8b1cnvd
News mentions
0No linked articles in our index yet.