VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2023-53844

CVE-2023-53844

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/ttm: Don't leak a resource on swapout move error

If moving the bo to system for swapout failed, we were leaking a resource. Fix.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A resource leak in Linux kernel's DRM TTM subsystem occurs when buffer object swapout to system memory fails.

A memory leak vulnerability exists in the Linux kernel's Direct Rendering Manager (DRM) Translation Table Manager (TTM) subsystem. When a buffer object (BO) is moved to system memory for swapout and the operation fails, the associated resource is not properly freed, leading to a resource leak [1].

The vulnerability can be triggered when the system attempts to swap out a BO, such as under memory pressure, but the move operation fails due to, for example, an allocation error or other hardware-related issues. An attacker with local access and the ability to trigger such swapout failures could exploit this to exhaust system resources [2].

The impact is a memory leak that can gradually deplete available kernel memory, potentially leading to denial of service (DoS) conditions. No privilege escalation or data leak is reported.

The fix has been applied in the Linux kernel stable branches. Users are advised to update to the latest stable kernel versions to mitigate this issue [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.