VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2023-53801

CVE-2023-53801

Description

In the Linux kernel, the following vulnerability has been resolved:

iommu/sprd: Release dma buffer to avoid memory leak

When attaching to a domain, the driver would alloc a DMA buffer which is used to store address mapping table, and it need to be released when the IOMMU domain is freed.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's SPRD IOMMU driver, a DMA buffer allocated during domain attachment is not freed when the domain is freed, causing a memory leak.

Vulnerability

Overview

CVE-2023-53801 describes a memory leak in the Spreadtrum (SPRD) IOMMU driver within the Linux kernel. When a device attaches to an IOMMU domain, the driver allocates a DMA buffer to store the address mapping table. However, this buffer is not released when the IOMMU domain is freed, leading to a gradual loss of memory over time [1].

Exploitation

Context

The vulnerability is triggered through normal kernel operations involving IOMMU domain management. An attacker with the ability to repeatedly attach and detach devices from IOMMU domains—or to create and destroy domains—can cause the leaked DMA buffers to accumulate. No special privileges beyond local access are required, as the bug manifests during routine driver operations [2].

Impact

Over time, the unreleased DMA buffers exhaust system memory, potentially leading to denial of service (DoS) conditions. The system may become unresponsive or crash due to memory starvation. The leak is specific to the SPRD IOMMU implementation and does not affect other IOMMU drivers.

Mitigation

The fix has been applied in the Linux kernel stable tree via commits that ensure the DMA buffer is properly freed when the IOMMU domain is released [1][2]. Users should update to a kernel version containing these patches. No workaround is available other than applying the update.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.