{"id":"CVE-2023-52667","summary":"net/mlx5e: fix a potential double-free in fs_any_create_groups","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: fix a potential double-free in fs_any_create_groups\n\nWhen kcalloc() for ft-\u003eg succeeds but kvzalloc() for in fails,\nfs_any_create_groups() will free ft-\u003eg. However, its caller\nfs_any_create_table() will free ft-\u003eg again through calling\nmlx5e_destroy_flow_table(), which will lead to a double-free.\nFix this by setting ft-\u003eg to NULL in fs_any_create_groups().","modified":"2026-04-11T12:46:34.151884Z","published":"2024-05-17T14:01:48.454Z","related":["ALSA-2024:4211","ALSA-2024:4349","ALSA-2024:4352","SUSE-SU-2024:2135-1","SUSE-SU-2024:2203-1","SUSE-SU-2024:2372-1","SUSE-SU-2024:2394-1","SUSE-SU-2024:2939-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20249-1","USN-6818-2","USN-6819-2"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52667.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2897c981ee63e1be5e530b1042484626a10b26d8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/65a4ade8a6d205979292e88beeb6a626ddbd4779"},{"type":"WEB","url":"https://git.kernel.org/stable/c/72a729868592752b5a294d27453da264106983b1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/aef855df7e1bbd5aa4484851561211500b22707e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b2fa86b2aceb4bc9ada51cea90f61546d7512cbe"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52667.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52667"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0f575c20bf0686caf3d82d6c626c2e1e4a4c36e6"},{"fixed":"72a729868592752b5a294d27453da264106983b1"},{"fixed":"b2fa86b2aceb4bc9ada51cea90f61546d7512cbe"},{"fixed":"2897c981ee63e1be5e530b1042484626a10b26d8"},{"fixed":"65a4ade8a6d205979292e88beeb6a626ddbd4779"},{"fixed":"aef855df7e1bbd5aa4484851561211500b22707e"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52667.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.13.0"},{"fixed":"5.15.149"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.76"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.15"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.7.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52667.json"}}],"schema_version":"1.7.5"}