-
CVE-2023-53309
- EPSS 0.03%
- Published 16.09.2025 16:11:47
- Last modified 17.09.2025 14:18:55
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Fix integer overflow in radeon_cs_parser_init The type of size is unsigned, if size is 0x40000000, there will be an integer overflow, size will be zero after size *= sizeof(uint32_t), will cause uninitialized memory to be referenced later
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
d05ba46134d07e889de7d23cf8503574a22ede09
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
cfa9148bafb2d3292b65de1bac79dcca65be2643
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
b8fab6aebdf2115ec2d7bd2f3498d5b911ff351e
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
e6825b30d37fe89ceb87f926d33d4fad321a331e
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
c0d7dbc6b7a61a56028118c00af2c8319d44a682
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
2e1be420b86980c25a75325e90dfc3fc73126f61
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
25e634d7f44eb13113139040e5366bebe48c882f
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
f828b681d0cd566f86351c0b913e6cb6ed8c7b9c
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version <=
4.14.*
Version
4.14.324
Status
unaffected
Version <=
4.19.*
Version
4.19.293
Status
unaffected
Version <=
5.4.*
Version
5.4.255
Status
unaffected
Version <=
5.10.*
Version
5.10.192
Status
unaffected
Version <=
5.15.*
Version
5.15.123
Status
unaffected
Version <=
6.1.*
Version
6.1.42
Status
unaffected
Version <=
6.4.*
Version
6.4.7
Status
unaffected
Version <=
*
Version
6.5
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.078 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|