CVE-2023-54015
Use-After-Free in Linux mlx5_devcom Device Registration
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's mlx5 driver, specifically in the devcom component. When the devcom allocation fails, the code incorrectly frees a private data structure (priv) that might have been allocated by a different thread. This can lead to use-after-free bugs because the memory is freed improperly. The fix ensures that the priv is only freed if it was allocated by the running thread, preventing this unsafe memory operation.
How can this vulnerability impact me? :
The vulnerability can lead to use-after-free bugs in the Linux kernel's mlx5 driver, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges if they can trigger the bug. This impacts system reliability and security.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the mlx5_devcom_register_device error flow. This fix ensures that the priv is only freed if it was allocated by the running thread, preventing use-after-free bugs.