VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54091

CVE-2023-54091

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/client: Fix memory leak in drm_client_target_cloned

dmt_mode is allocated and never freed in this function. It was found with the ast driver, but most drivers using generic fbdev setup are probably affected.

This fixes the following kmemleak report: backtrace: [<00000000b391296d>] drm_mode_duplicate+0x45/0x220 [drm] [<00000000e45bb5b3>] drm_client_target_cloned.constprop.0+0x27b/0x480 [drm] [<00000000ed2d3a37>] drm_client_modeset_probe+0x6bd/0xf50 [drm] [<0000000010e5cc9d>] __drm_fb_helper_initial_config_and_unlock+0xb4/0x2c0 [drm_kms_helper] [<00000000909f82ca>] drm_fbdev_client_hotplug+0x2bc/0x4d0 [drm_kms_helper] [<00000000063a69aa>] drm_client_register+0x169/0x240 [drm] [<00000000a8c61525>] ast_pci_probe+0x142/0x190 [ast] [<00000000987f19bb>] local_pci_probe+0xdc/0x180 [<000000004fca231b>] work_for_cpu_fn+0x4e/0xa0 [<0000000000b85301>] process_one_work+0x8b7/0x1540 [<000000003375b17c>] worker_thread+0x70a/0xed0 [<00000000b0d43cd9>] kthread+0x29f/0x340 [<000000008d770833>] ret_from_fork+0x1f/0x30 unreferenced object 0xff11000333089a00 (size 128):

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Memory leak in drm_client_target_cloned() due to unreleased dmt_mode allocation affects Linux DRM clients using generic fbdev setup.

Root

Cause CVE-2023-54091 describes a memory leak in the Linux kernel's DRM subsystem. In the function drm_client_target_cloned(), a display mode (dmt_mode) is allocated via drm_mode_duplicate() but is never freed. This means every invocation of this function loses 128 bytes of kernel memory, as confirmed by a kmemleak report [1][2][3][4]. The leak is triggered during client mode probing, which happens when a DRM device initializes its framebuffer configuration.

Exploitation

Conditions An attacker does not need special privileges to trigger the leak; it occurs automatically during normal operation of affected drivers. The vulnerability was found with the AST (ASpeed) driver, but the description notes that most drivers using the generic framebuffer (fbdev) setup are likely affected. The leak is reproducible without any explicit user input, as it happens during system boot or hotplug events when the drm_fbdev_client_hotplug() function calls into the vulnerable code path [1].

Impact

The primary impact is resource exhaustion. By repeatedly triggering DRM client initialization—for instance through repeated hotplug events or system resume cycles—an attacker could exhaust system memory, leading to denial of service (DoS). The kernel's kmemleak tool detects the leak as an "unreferenced object" of size 128 bytes, indicating the memory is permanently lost. No code execution or privilege escalation is possible; the leak is purely a memory resource drain.

Mitigation

The fix has been applied in multiple Linux stable kernel branches [2][3][4]. The patch simply adds a kfree(dmt_mode) call in the appropriate cleanup path. Users should update their kernel to a version that includes the commit, such as those referenced in the stable kernels. There is no known workaround beyond applying the kernel patch.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.