CVE-2023-53309Integer Overflow or Wraparound in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 16

Description

In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Fix integer overflow in radeon_cs_parser_init The type of size is unsigned, if size is 0x40000000, there will be an integer overflow, size will be zero after size *= sizeof(uint32_t), will cause uninitialized memory to be referenced later

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel4.154.19.293+6
Debianlinux/linux_kernel< 5.10.197-1+3
CVEListV5linux/linux28a326c592e3e444c59f28b3e60c3b07692928d6d05ba46134d07e889de7d23cf8503574a22ede09+8
debiandebian/linux< linux 6.1.52-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-4rmv-vj76-xqwc: In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Fix integer overflow in radeon_cs_parser_init The type of size is un2025-09-16
OSV
CVE-2023-53309: In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Fix integer overflow in radeon_cs_parser_init The type of size is unsi2025-09-16

📋Vendor Advisories

2
Red Hat
kernel: Linux kernel: Denial of Service via integer overflow in radeon_cs_parser_init2025-09-16
Debian
CVE-2023-53309: linux - In the Linux kernel, the following vulnerability has been resolved: drm/radeon:...2023
CVE-2023-53309 — Integer Overflow or Wraparound | cvebase