In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1
The type of size is unsigned int, if size is 0x40000000, there will
be an integer overflow, size will be zero after size *= sizeof(uint32_t),
will cause uninitialized memory to be referenced later.
Metrics
Affected Vendors & Products
References
History
Thu, 23 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linux
Linux linux Kernel |
|
| Vendors & Products |
Linux
Linux linux Kernel |
Thu, 23 Oct 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 22 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1 The type of size is unsigned int, if size is 0x40000000, there will be an integer overflow, size will be zero after size *= sizeof(uint32_t), will cause uninitialized memory to be referenced later. | |
| Title | drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1 | |
| References |
|
Status: PUBLISHED
Assigner: Linux
Published: 2025-10-22T13:23:43.822Z
Updated: 2025-10-22T13:23:43.822Z
Reserved: 2025-10-22T13:21:37.346Z
Link: CVE-2023-53707
No data.
Status : Awaiting Analysis
Published: 2025-10-22T14:15:45.303
Modified: 2025-10-22T21:12:48.953
Link: CVE-2023-53707