CVE-2023-54262 — Use After Free in Linux
Severity
5.8MEDIUM
No vectorEPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Don't clone flow post action attributes second time
The code already clones post action attributes in
mlx5e_clone_flow_attr_for_post_act(). Creating another copy in
mlx5e_tc_post_act_add() is a erroneous leftover from original
implementation. Instead, assign handle->attribute to post_attr provided by
the caller. Note that cloning the attribute second time is not just
wasteful but also causes issues like second copy …
Affected Packages4 packages
▶CVEListV5linux/linux8300f225268be9ee2c0daf5a3f23929fcdcbf213 — c382b693ffcb1f1ebf60d76ab9dedfe9ea13eedf+4
🔴Vulnerability Details
3OSV▶
CVE-2023-54262: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Don't clone flow post action attributes second time The code already cl↗2025-12-30
GHSA▶
GHSA-jg98-775f-9rrv: In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Don't clone flow post action attributes second time
The code already↗2025-12-30