CVE-2023-53453
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| radeon | radeon | * |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's Radeon driver. Specifically, an internal object (iio) allocated during the driver's operation is not properly freed when the driver shuts down, causing a kernel memory leak (kmemleak). The fix involves releasing this allocated memory during driver shutdown to prevent the leak.
How can this vulnerability impact me? :
This vulnerability can cause a memory leak in the Linux kernel when the Radeon driver is unloaded, potentially leading to increased memory usage and reduced system stability or performance over time.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by freeing the iio object in the radeon_atombios_fini() function when the Radeon driver is shut down. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix, ensuring the Radeon driver properly releases allocated resources during shutdown.