CVE-2023-53453

Source
https://cve.org/CVERecord?id=CVE-2023-53453
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53453.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53453
Downstream
Related
Published
2025-10-01T11:42:24.649Z
Modified
2026-04-11T12:46:47.880489Z
Summary
drm/radeon: free iio for atombios when driver shutdown
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: free iio for atombios when driver shutdown

Fix below kmemleak when unload radeon driver:

unreferenced object 0xffff9f8608ede200 (size 512): comm "systemd-udevd", pid 326, jiffies 4294682822 (age 716.338s) hex dump (first 32 bytes): 00 00 00 00 c4 aa ec aa 14 ab 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000062fadebe>] kmemcachealloctrace+0x2f1/0x500 [<00000000b6883cea>] atomparse+0x117/0x230 [radeon] [<00000000158c23fd>] radeonatombiosinit+0xab/0x170 [radeon] [<00000000683f672e>] siinit+0x57/0x750 [radeon] [<00000000566cc31f>] radeondeviceinit+0x559/0x9c0 [radeon] [<0000000046efabb3>] radeondriverloadkms+0xc1/0x1a0 [radeon] [<00000000b5155064>] drmdevregister+0xdd/0x1d0 [<0000000045fec835>] radeonpciprobe+0xbd/0x100 [radeon] [<00000000e69ecca3>] pcideviceprobe+0xe1/0x160 [<0000000019484b76>] really_probe.part.0+0xc1/0x2c0 [<000000003f2649da>] __driverprobedevice+0x96/0x130 [<00000000231c5bb1>] driverprobedevice+0x24/0xf0 [<0000000000a42377>] _driverattach+0x77/0x190 [<00000000d7574da6>] busforeachdev+0x7f/0xd0 [<00000000633166d2>] driverattach+0x1e/0x30 [<00000000313b05b8>] busadddriver+0x12c/0x1e0

iio was allocated in atomindexiio() called by atomparse(), but it doesn't got released when the dirver is shutdown. Fix this kmemleak by free it in radeonatombios_fini().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53453.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
771fe6b912fca54f03e8a72eb63058b582775362
Fixed
cb109cedbba11c33473e6780c256d8442a9e4460
Fixed
9cdb96b55651c92fc949cfd54124406c3c912b6b
Fixed
f9f55fc64928b5e30d78f861c5fc76db9e769ebb
Fixed
ce9e9d3dcbb0d1551ffd1a7f16e7c051f3ba4140
Fixed
cda2f7efbc2d857220dad32e315a54565b285c1c
Fixed
107b8b542bb9dab4cbdc3276c85fbdd7f6782313
Fixed
e2791f2f4d1d804e45fa91b14295c326b64c65f1
Fixed
4773fadedca918faec443daaca5e4ea1c0ced144

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53453.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.31
Fixed
4.14.308
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.276
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.235
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.173
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.99
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.16
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53453.json"