CVE-2023-53501 — Improper Update of Reference Count in Linux
Severity
4.7MEDIUMNVD
EPSS
0.0%
top 95.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 1
Description
In the Linux kernel, the following vulnerability has been resolved:
iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind
When unbinding pasid - a race condition exists vs outstanding page faults.
To prevent this, the pasid_state object contains a refcount.
* set to 1 on pasid bind
* incremented on each ppr notification start
* decremented on each ppr notification done
* decremented on pasid unbind
Since refcount_dec assumes that refcount will never reach 0:
the curr…
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.0 | Impact: 3.6
Affected Packages4 packages
▶CVEListV5linux/linux8bc54824da4e8fcf0ed679cf09ac32f23d83254a — a50d60b8f2aff46dd7c7edb4a5835cdc4d432c22+5
Patches
🔴Vulnerability Details
2GHSA▶
GHSA-76q6-633x-65vj: In the Linux kernel, the following vulnerability has been resolved:
iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind
W↗2025-10-01
OSV▶
CVE-2023-53501: In the Linux kernel, the following vulnerability has been resolved: iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind Whe↗2025-10-01
📋Vendor Advisories
2💬Community
1Bugzilla▶
CVE-2023-53501 kernel: Linux kernel: Denial of Service due to race condition in IOMMU pasid unbinding↗2025-10-01