In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: Fix integer overflow in radeon_cs_parser_init

The type of size is unsigned, if size is 0x40000000, there will be an
integer overflow, size will be zero after size *= sizeof(uint32_t),
will cause uninitialized memory to be referenced later
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 16 Sep 2025 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Fix integer overflow in radeon_cs_parser_init The type of size is unsigned, if size is 0x40000000, there will be an integer overflow, size will be zero after size *= sizeof(uint32_t), will cause uninitialized memory to be referenced later
Title drm/radeon: Fix integer overflow in radeon_cs_parser_init
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2025-09-16T16:11:47.700Z

Reserved: 2025-09-16T16:08:59.562Z

Link: CVE-2023-53309

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-16T17:15:36.720

Modified: 2025-09-16T17:15:36.720

Link: CVE-2023-53309

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.