{"id":"CVE-2023-53546","summary":"net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx\n\nwhen mlx5_cmd_exec failed in mlx5dr_cmd_create_reformat_ctx, the memory\npointed by 'in' is not released, which will cause memory leak. Move memory\nrelease after mlx5_cmd_exec.","modified":"2026-04-11T12:46:49.731410Z","published":"2025-10-04T15:16:54.132Z","related":["SUSE-SU-2025:21040-1","SUSE-SU-2025:21052-1","SUSE-SU-2025:21056-1","SUSE-SU-2025:21064-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4128-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4140-1","SUSE-SU-2025:4141-1","SUSE-SU-2025:4149-1","SUSE-SU-2025:4301-1","SUSE-SU-2025:4320-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53546.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/00cecb0a8f9e7a21754d5ad85813ab6b47b3308f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/165159854757dbae0dfd1812b27051da35aa6223"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3169c3854397f3070a63b1b772db16dcb8cba7b4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5dd77585dd9d0e03dd1bceb95f0269a7eaf6b936"},{"type":"WEB","url":"https://git.kernel.org/stable/c/622d71d99124e69f7bf2e2b7a89f5f444a24d235"},{"type":"WEB","url":"https://git.kernel.org/stable/c/800d8c96bf997da5eb76ccf8d88795c4231c83fb"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53546.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53546"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1d9186476e12c85dc81a0f01f5c614a9683af7f2"},{"fixed":"800d8c96bf997da5eb76ccf8d88795c4231c83fb"},{"fixed":"165159854757dbae0dfd1812b27051da35aa6223"},{"fixed":"00cecb0a8f9e7a21754d5ad85813ab6b47b3308f"},{"fixed":"3169c3854397f3070a63b1b772db16dcb8cba7b4"},{"fixed":"622d71d99124e69f7bf2e2b7a89f5f444a24d235"},{"fixed":"5dd77585dd9d0e03dd1bceb95f0269a7eaf6b936"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53546.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.4.0"},{"fixed":"5.4.253"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.190"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.126"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.45"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.4.10"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53546.json"}}],"schema_version":"1.7.5"}