-
CVE-2023-53707
- EPSS 0.03%
- Veröffentlicht 22.10.2025 13:23:43
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1 The type of size is unsigned int, if size is 0x40000000, there will be an integer overflow, size will be zero after size *= sizeof(uint32_t), will cause uninitialized memory to be referenced later.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Version <
9f55d300541cb5b435984d269087810581580b00
Status
affected
Version
d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Version <
c3deb091398e9e469d08dd1599b6d76fd6b29df8
Status
affected
Version
d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Version <
87c2213e85bd81e4a9a4d0880c256568794ae388
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.2
Status
affected
Version
0
Version <
4.2
Status
unaffected
Version <=
6.1.*
Version
6.1.47
Status
unaffected
Version <=
6.4.*
Version
6.4.12
Status
unaffected
Version <=
*
Version
6.5
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.073 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|