-

CVE-2023-53309

In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: Fix integer overflow in radeon_cs_parser_init

The type of size is unsigned, if size is 0x40000000, there will be an
integer overflow, size will be zero after size *= sizeof(uint32_t),
will cause uninitialized memory to be referenced later

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < d05ba46134d07e889de7d23cf8503574a22ede09
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < cfa9148bafb2d3292b65de1bac79dcca65be2643
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < b8fab6aebdf2115ec2d7bd2f3498d5b911ff351e
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < e6825b30d37fe89ceb87f926d33d4fad321a331e
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < c0d7dbc6b7a61a56028118c00af2c8319d44a682
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 2e1be420b86980c25a75325e90dfc3fc73126f61
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 25e634d7f44eb13113139040e5366bebe48c882f
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < f828b681d0cd566f86351c0b913e6cb6ed8c7b9c
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 4.14.*
Version 4.14.324
Status unaffected
Version <= 4.19.*
Version 4.19.293
Status unaffected
Version <= 5.4.*
Version 5.4.255
Status unaffected
Version <= 5.10.*
Version 5.10.192
Status unaffected
Version <= 5.15.*
Version 5.15.123
Status unaffected
Version <= 6.1.*
Version 6.1.42
Status unaffected
Version <= 6.4.*
Version 6.4.7
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string