CVE-2023-53501
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's AMD IOMMU pasid handling. Specifically, when unbinding a pasid (Process Address Space ID), the reference count (refcount) of the pasid_state object can be decremented incorrectly, causing a warning and potential memory leak. The refcount is used to track usage and is expected never to reach zero during unbind, but due to the race condition with outstanding page faults, it can hit zero, triggering a warning. The fix changes the decrement function to properly handle the case when the refcount reaches one.
How can this vulnerability impact me? :
This vulnerability can lead to memory leaks in the Linux kernel when unbinding pasid due to incorrect reference count handling. While it triggers a warning, it may cause instability or resource exhaustion over time if the memory leak accumulates, potentially affecting system reliability.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch or update to the fixed version of the Linux kernel that includes the correction for the pasid_state refcount decrement issue. This fix changes the refcount decrement function to properly handle the refcount reaching zero, preventing the race condition and warning. Until patched, monitor kernel logs for REFCOUNT_WARN messages related to pasid unbind operations as an indicator of the issue.