CVE-2023-53801Missing Release of Memory after Effective Lifetime in Linux

6 documents5 sources
Severity
N/A
No vector
EPSS
0.0%
top 90.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: iommu/sprd: Release dma buffer to avoid memory leak When attaching to a domain, the driver would alloc a DMA buffer which is used to store address mapping table, and it need to be released when the IOMMU domain is freed.

Affected Packages4 packages

Linuxlinux/linux_kernel5.13.05.15.113+2
Debianlinux/linux_kernel< 6.1.82-1+2
CVEListV5linux/linuxb23e4fc4e3faed0b8b604079c44a244da3ec941a92c089a931fd3939cd32318cf4f54e69e8f51a19+4
debiandebian/linux< linux 6.1.82-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-pj52-jg99-wg36: In the Linux kernel, the following vulnerability has been resolved: iommu/sprd: Release dma buffer to avoid memory leak When attaching to a domain,2025-12-09
OSV
iommu/sprd: Release dma buffer to avoid memory leak2025-12-09
OSV
CVE-2023-53801: In the Linux kernel, the following vulnerability has been resolved: iommu/sprd: Release dma buffer to avoid memory leak When attaching to a domain, th2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: iommu/sprd: Release dma buffer to avoid memory leak2025-12-09
Debian
CVE-2023-53801: linux - In the Linux kernel, the following vulnerability has been resolved: iommu/sprd:...2023