Home

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1 The type of size is unsigned int, if size is 0x40000000, there will be an integer overflow, size will be zero after size *= sizeof(uint32_t), will cause uninitialized memory to be referenced later.

PUBLISHED Reserved 2025-10-22 | Published 2025-10-22 | Updated 2025-10-22 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 9f55d300541cb5b435984d269087810581580b00
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before c3deb091398e9e469d08dd1599b6d76fd6b29df8
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 87c2213e85bd81e4a9a4d0880c256568794ae388
affected

Default status
affected

6.1.47 (semver)
unaffected

6.4.12 (semver)
unaffected

6.5 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/9f55d300541cb5b435984d269087810581580b00

git.kernel.org/...c/c3deb091398e9e469d08dd1599b6d76fd6b29df8

git.kernel.org/...c/87c2213e85bd81e4a9a4d0880c256568794ae388

cve.org (CVE-2023-53707)

nvd.nist.gov (CVE-2023-53707)

Download JSON