CVE-2023-53171
15.09.2025, 14:15
In the Linux kernel, the following vulnerability has been resolved: vfio/type1: prevent underflow of locked_vm via exec() When a vfio container is preserved across exec, the task does not change, but it gets a new mm with locked_vm=0, and loses the count from existing dma mappings. If the user later unmaps a dma mapping, locked_vm underflows to a large unsigned value, and a subsequent dma map request fails with ENOMEM in __account_locked_vm. To avoid underflow, grab and save the mm at the time a dma is mapped. Use that mm when adjusting locked_vm, rather than re-acquiring the saved task's mm, which may have changed. If the saved mm is dead, do nothing. locked_vm is incremented for existing mappings in a subsequent patch.Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 3.6 ≤ 𝑥 < 5.10.173 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.99 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.16 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.2.3 |
𝑥
= Vulnerable software versions
Debian Releases
References