VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2023-54254

CVE-2023-54254

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/ttm: Don't leak a resource on eviction error

On eviction errors other than -EMULTIHOP we were leaking a resource. Fix.

v2: - Avoid yet another goto (Andi Shyti)

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A resource leak in Linux kernel's drm/ttm when handling eviction errors other than -EMULTIHOP could lead to memory exhaustion; fixed by properly releasing the resource.

CVE-2023-54254 is a memory leak vulnerability in the Linux kernel's TTM (Translation Table Manager) subsystem within the drm framework. When an eviction operation fails with an error code other than -EMULTIHOP, the code path fails to release a previously allocated resource, causing a leak [1][2].

The vulnerability can be triggered by an attacker who can cause eviction errors during memory management operations. No authentication is required if the attacker can influence memory pressure or submit GPU workloads that lead to eviction failures. The attack surface is local, requiring access to the DRM subsystem, typically via a graphics device.

If repeatedly triggered, the resource leak can lead to memory exhaustion, potentially causing denial of service (system hang or crash) due to depleted kernel memory pools [1].

The fix was applied to the stable Linux kernel branches via commits e8188c461ee0 and 6aea0032380b [1][2]. Users should update to the latest kernel version containing these commits.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.