VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2023-54294

CVE-2023-54294

Description

In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix memleak of md thread

In raid10_run(), if setup_conf() succeed and raid10_run() failed before setting 'mddev->thread', then in the error path 'conf->thread' is not freed.

Fix the problem by setting 'mddev->thread' right after setup_conf().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in the Linux kernel's md/raid10 driver can leave conf->thread unfreed when raid10_run() fails after setup_conf() succeeds.

Vulnerability

Description

A memory leak vulnerability exists in the Linux kernel's Multiple Device (MD) driver for RAID10. In the raid10_run() function, if setup_conf() successfully allocates conf->thread but a subsequent step fails before mddev->thread is set, the allocated memory is not freed in the error path. This results in a kernel memory leak [1][2][3].

Exploitation

To exploit this vulnerability, an attacker must be able to trigger raid10_run() in a way that forces a failure after setup_conf() completes. This could be achieved by attempting to create or assemble a RAID10 array with an invalid configuration or causing an error during the device initialization. The attack requires local access with sufficient privileges (typically root) to manage MD devices.

Impact

The impact is a gradual depletion of system memory due to the unreleased allocation. While this does not directly lead to privilege escalation or code execution, repeated exploitation could exhaust memory resources, potentially causing system instability or denial of service.

Mitigation

The vulnerability is fixed in Linux kernel commits [1][2][3]. The fix ensures that mddev->thread is set immediately after setup_conf() so that any subsequent failure will properly clean up the thread allocation. Users should apply the latest kernel updates to remediate this issue.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.