{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T19:02:46.604","vulnerabilities":[{"cve":{"id":"CVE-2023-53801","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-12-09T01:16:51.860","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\niommu/sprd: Release dma buffer to avoid memory leak\n\nWhen attaching to a domain, the driver would alloc a DMA buffer which\nis used to store address mapping table, and it need to be released\nwhen the IOMMU domain is freed."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/8745f3592ee4a7b49ede16ddd3f12a41ecaa23c9","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/92c089a931fd3939cd32318cf4f54e69e8f51a19","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/9afea57384d4ae7b2034593eac7fa76c7122762a","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/d0a917fd5e3b3ed9d9306b4260ba684b982da9f3","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}