CVE-2023-53707Linux vulnerability

6 documents5 sources
Severity
N/A
No vector
EPSS
0.0%
top 93.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 22

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1 The type of size is unsigned int, if size is 0x40000000, there will be an integer overflow, size will be zero after size *= sizeof(uint32_t), will cause uninitialized memory to be referenced later.

Affected Packages4 packages

Linuxlinux/linux_kernel4.2.06.1.47+1
Debianlinux/linux_kernel< 6.1.52-1+2
CVEListV5linux/linuxd38ceaf99ed015f2a0b9af3499791bd3a3daae219f55d300541cb5b435984d269087810581580b00+3
debiandebian/linux< linux 6.1.52-1 (bookworm)

🔴Vulnerability Details

3
OSV
drm/amdgpu: Fix integer overflow in amdgpu_cs_pass12025-10-22
OSV
CVE-2023-53707: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1 The type of size is unsigned i2025-10-22
GHSA
GHSA-xc82-v759-f4jv: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1 The type of size is unsigned2025-10-22

📋Vendor Advisories

2
Red Hat
kernel: drm/amdgpu: Fix integer overflow in amdgpu_cs_pass12025-10-22
Debian
CVE-2023-53707: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu:...2023