CVE-2023-54254
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/ttm: Don't leak a resource on eviction error
On eviction errors other than -EMULTIHOP we were leaking a resource. Fix.
v2: - Avoid yet another goto (Andi Shyti)
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A resource leak in Linux kernel's drm/ttm when handling eviction errors other than -EMULTIHOP could lead to memory exhaustion; fixed by properly releasing the resource.
CVE-2023-54254 is a memory leak vulnerability in the Linux kernel's TTM (Translation Table Manager) subsystem within the drm framework. When an eviction operation fails with an error code other than -EMULTIHOP, the code path fails to release a previously allocated resource, causing a leak [1][2].
The vulnerability can be triggered by an attacker who can cause eviction errors during memory management operations. No authentication is required if the attacker can influence memory pressure or submit GPU workloads that lead to eviction failures. The attack surface is local, requiring access to the DRM subsystem, typically via a graphics device.
If repeatedly triggered, the resource leak can lead to memory exhaustion, potentially causing denial of service (system hang or crash) due to depleted kernel memory pools [1].
The fix was applied to the stable Linux kernel branches via commits e8188c461ee0 and 6aea0032380b [1][2]. Users should update to the latest kernel version containing these commits.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
47738335d73d0e9c44738cb1f6aea0032380be8188c461ee0Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.