CVE-2023-53171Integer Underflow (Wrap or Wraparound) in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 15

Description

In the Linux kernel, the following vulnerability has been resolved: vfio/type1: prevent underflow of locked_vm via exec() When a vfio container is preserved across exec, the task does not change, but it gets a new mm with locked_vm=0, and loses the count from existing dma mappings. If the user later unmaps a dma mapping, locked_vm underflows to a large unsigned value, and a subsequent dma map request fails with ENOMEM in __account_locked_vm. To avoid underflow, grab and save the mm at the tim

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel3.65.10.173+3
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux73fa0d10d077d9521ee2dace2307ae2c9a9653365a271242716846cc016736fb76be2b40ee49b0c3+5
debiandebian/linux< linux 6.1.20-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53171: In the Linux kernel, the following vulnerability has been resolved: vfio/type1: prevent underflow of locked_vm via exec() When a vfio container is pre2025-09-15
GHSA
GHSA-w3pr-pqpr-2f83: In the Linux kernel, the following vulnerability has been resolved: vfio/type1: prevent underflow of locked_vm via exec() When a vfio container is p2025-09-15

📋Vendor Advisories

2
Red Hat
kernel: Linux kernel: Denial of Service in vfio/type1 due to locked_vm underflow2025-09-15
Debian
CVE-2023-53171: linux - In the Linux kernel, the following vulnerability has been resolved: vfio/type1:...2023
CVE-2023-53171 — Integer Underflow (Wrap or Wraparound) | cvebase