{"id":"CVE-2023-54201","summary":"RDMA/efa: Fix wrong resources deallocation order","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/efa: Fix wrong resources deallocation order\n\nWhen trying to destroy QP or CQ, we first decrease the refcount and\npotentially free memory regions allocated for the object and then\nrequest the device to destroy the object. If the device fails, the\nobject isn't fully destroyed so the user/IB core can try to destroy the\nobject again which will lead to underflow when trying to decrease an\nalready zeroed refcount.\n\nDeallocate resources in reverse order of allocating them to safely free\nthem.","modified":"2026-04-02T09:45:40.623539Z","published":"2025-12-30T12:09:06.211Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54201.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/24f9884971f9b34915b67baacf7350a3f6f19ea4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cf38960386f3cc4abf395e556af915e4babcafd2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dc202c57e9a1423aed528e4b8dc949509cd32191"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e79db2f51a564fd4daa3e508b987df5e81c34b20"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54201.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54201"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"ff6629f88c529b07d9704c656c64dae76910e3e9"},{"fixed":"cf38960386f3cc4abf395e556af915e4babcafd2"},{"fixed":"e79db2f51a564fd4daa3e508b987df5e81c34b20"},{"fixed":"24f9884971f9b34915b67baacf7350a3f6f19ea4"},{"fixed":"dc202c57e9a1423aed528e4b8dc949509cd32191"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54201.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.7.0"},{"fixed":"6.1.53"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.4.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.5.0"},{"fixed":"6.5.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54201.json"}}],"schema_version":"1.7.5"}