CVE-2023-54188
Description
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: apple-admac: Fix 'current_tx' not getting freed
In terminate_all we should queue up all submitted descriptors to be freed. We do that for the content of the 'issued' and 'submitted' lists, but the 'current_tx' descriptor falls through the cracks as it's removed from the 'issued' list once it gets assigned to be the current descriptor. Explicitly queue up freeing of the 'current_tx' descriptor to address a memory leak that is otherwise present.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in the Apple ADMAC DMA engine driver occurs because the 'current_tx' descriptor is not freed during terminate_all.
Vulnerability
Overview
In the Linux kernel's Apple ADMAC (Apple DMA Controller) driver, a memory leak exists in the terminate_all function. The driver maintains lists of submitted and issued DMA descriptors, and a pointer to the currently executing descriptor (current_tx). When terminate_all is called, it correctly queues descriptors from the 'submitted' and 'issued' lists for freeing, but the current_tx descriptor is removed from the 'issued' list when it becomes the active descriptor, causing it to be missed during cleanup [1].
Exploitation and
Impact
An attacker with the ability to trigger DMA termination (e.g., by closing a file descriptor or unloading a driver) can repeatedly cause this memory leak. Over time, this leads to kernel memory exhaustion, potentially resulting in a denial-of-service (DoS) condition. No special privileges are required beyond the ability to interact with the ADMAC subsystem, which may be accessible to unprivileged users depending on device permissions.
Mitigation
The fix, introduced in Linux kernel commit d9503be5a100, explicitly queues the current_tx descriptor for freeing in terminate_all, preventing the leak. Users should apply the latest stable kernel updates to address this vulnerability [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
3b7abd535881afd4d88e68c75d9503be5a100Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.