CVE-2023-53844
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/ttm: Don't leak a resource on swapout move error
If moving the bo to system for swapout failed, we were leaking a resource. Fix.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A resource leak in Linux kernel's DRM TTM subsystem occurs when buffer object swapout to system memory fails.
A memory leak vulnerability exists in the Linux kernel's Direct Rendering Manager (DRM) Translation Table Manager (TTM) subsystem. When a buffer object (BO) is moved to system memory for swapout and the operation fails, the associated resource is not properly freed, leading to a resource leak [1].
The vulnerability can be triggered when the system attempts to swap out a BO, such as under memory pressure, but the move operation fails due to, for example, an allocation error or other hardware-related issues. An attacker with local access and the ability to trigger such swapout failures could exploit this to exhaust system resources [2].
The impact is a memory leak that can gradually deplete available kernel memory, potentially leading to denial of service (DoS) conditions. No privilege escalation or data leak is reported.
The fix has been applied in the Linux kernel stable branches. Users are advised to update to the latest stable kernel versions to mitigate this issue [1][2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
4af4e0ce2af8af037f60387364a5b37ea6797a590f03d8de7Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.