-
CVE-2023-53501
- EPSS 0.02%
- Published 01.10.2025 12:15:53
- Last modified 02.10.2025 19:11:46
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind When unbinding pasid - a race condition exists vs outstanding page faults. To prevent this, the pasid_state object contains a refcount. * set to 1 on pasid bind * incremented on each ppr notification start * decremented on each ppr notification done * decremented on pasid unbind Since refcount_dec assumes that refcount will never reach 0: the current implementation causes the following to be invoked on pasid unbind: REFCOUNT_WARN("decrement hit 0; leaking memory") Fix this issue by changing refcount_dec to refcount_dec_and_test to explicitly handle refcount=1.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
a50d60b8f2aff46dd7c7edb4a5835cdc4d432c22
Version
8bc54824da4e8fcf0ed679cf09ac32f23d83254a
Status
affected
Version <
13ed255248dfbbb7f23f9170c7a537fb9ca22c73
Version
8bc54824da4e8fcf0ed679cf09ac32f23d83254a
Status
affected
Version <
9ccc51be3126b25cfe9351dbffde946c925cc28a
Version
8bc54824da4e8fcf0ed679cf09ac32f23d83254a
Status
affected
Version <
98d86bf32187db27946ca817c2467a5f2f7aa02f
Version
8bc54824da4e8fcf0ed679cf09ac32f23d83254a
Status
affected
Version <
534103bcd52ca9c1fecbc70e717b4a538dc4ded8
Version
8bc54824da4e8fcf0ed679cf09ac32f23d83254a
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
5.15
Status
affected
Version <
5.15
Version
0
Status
unaffected
Version <=
5.15.*
Version
5.15.132
Status
unaffected
Version <=
6.1.*
Version
6.1.53
Status
unaffected
Version <=
6.4.*
Version
6.4.16
Status
unaffected
Version <=
6.5.*
Version
6.5.3
Status
unaffected
Version <=
*
Version
6.6
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.05 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|