VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2023-54188

CVE-2023-54188

Description

In the Linux kernel, the following vulnerability has been resolved:

dmaengine: apple-admac: Fix 'current_tx' not getting freed

In terminate_all we should queue up all submitted descriptors to be freed. We do that for the content of the 'issued' and 'submitted' lists, but the 'current_tx' descriptor falls through the cracks as it's removed from the 'issued' list once it gets assigned to be the current descriptor. Explicitly queue up freeing of the 'current_tx' descriptor to address a memory leak that is otherwise present.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in the Apple ADMAC DMA engine driver occurs because the 'current_tx' descriptor is not freed during terminate_all.

Vulnerability

Overview

In the Linux kernel's Apple ADMAC (Apple DMA Controller) driver, a memory leak exists in the terminate_all function. The driver maintains lists of submitted and issued DMA descriptors, and a pointer to the currently executing descriptor (current_tx). When terminate_all is called, it correctly queues descriptors from the 'submitted' and 'issued' lists for freeing, but the current_tx descriptor is removed from the 'issued' list when it becomes the active descriptor, causing it to be missed during cleanup [1].

Exploitation and

Impact

An attacker with the ability to trigger DMA termination (e.g., by closing a file descriptor or unloading a driver) can repeatedly cause this memory leak. Over time, this leads to kernel memory exhaustion, potentially resulting in a denial-of-service (DoS) condition. No special privileges are required beyond the ability to interact with the ADMAC subsystem, which may be accessible to unprivileged users depending on device permissions.

Mitigation

The fix, introduced in Linux kernel commit d9503be5a100, explicitly queues the current_tx descriptor for freeing in terminate_all, preventing the leak. Users should apply the latest stable kernel updates to address this vulnerability [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.