CVE-2023-53501

Source
https://cve.org/CVERecord?id=CVE-2023-53501
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53501.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53501
Downstream
Related
Published
2025-10-01T11:45:52.204Z
Modified
2026-05-15T11:54:44.576157212Z
Summary
iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind
Details

In the Linux kernel, the following vulnerability has been resolved:

iommu/amd/iommuv2: Fix pasidstate refcount dec hit 0 warning on pasid unbind

When unbinding pasid - a race condition exists vs outstanding page faults.

To prevent this, the pasid_state object contains a refcount. * set to 1 on pasid bind * incremented on each ppr notification start * decremented on each ppr notification done * decremented on pasid unbind

Since refcountdec assumes that refcount will never reach 0: the current implementation causes the following to be invoked on pasid unbind: REFCOUNTWARN("decrement hit 0; leaking memory")

Fix this issue by changing refcountdec to refcountdecandtest to explicitly handle refcount=1.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53501.json"
}
References

Affected packages

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.15.0
Fixed
5.15.132
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.53
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.16
Type
ECOSYSTEM
Events
Introduced
6.5.0
Fixed
6.5.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53501.json"