In the Linux kernel, the following vulnerability has been resolved:
drm/radeon: Fix integer overflow in radeon_cs_parser_init
The type of size is unsigned, if size is 0x40000000, there will be an
integer overflow, size will be zero after size *= sizeof(uint32_t),
will cause uninitialized memory to be referenced later
drm/radeon: Fix integer overflow in radeon_cs_parser_init
The type of size is unsigned, if size is 0x40000000, there will be an
integer overflow, size will be zero after size *= sizeof(uint32_t),
will cause uninitialized memory to be referenced later
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 16 Sep 2025 16:30:00 +0000

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-09-16T16:11:47.700Z
Reserved: 2025-09-16T16:08:59.562Z
Link: CVE-2023-53309

No data.

Status : Received
Published: 2025-09-16T17:15:36.720
Modified: 2025-09-16T17:15:36.720
Link: CVE-2023-53309

No data.

No data.