CVE-2023-53309

Source
https://cve.org/CVERecord?id=CVE-2023-53309
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53309.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53309
Downstream
Related
Published
2025-09-16T16:11:47.700Z
Modified
2026-03-20T12:33:05.507479Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
drm/radeon: Fix integer overflow in radeon_cs_parser_init
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: Fix integer overflow in radeoncsparser_init

The type of size is unsigned, if size is 0x40000000, there will be an integer overflow, size will be zero after size *= sizeof(uint32_t), will cause uninitialized memory to be referenced later

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53309.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
28a326c592e3e444c59f28b3e60c3b07692928d6
Fixed
d05ba46134d07e889de7d23cf8503574a22ede09
Fixed
cfa9148bafb2d3292b65de1bac79dcca65be2643
Fixed
b8fab6aebdf2115ec2d7bd2f3498d5b911ff351e
Fixed
e6825b30d37fe89ceb87f926d33d4fad321a331e
Fixed
c0d7dbc6b7a61a56028118c00af2c8319d44a682
Fixed
2e1be420b86980c25a75325e90dfc3fc73126f61
Fixed
25e634d7f44eb13113139040e5366bebe48c882f
Fixed
f828b681d0cd566f86351c0b913e6cb6ed8c7b9c

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53309.json"