๐Ÿ” CVE Alert

CVE-2023-53453

UNKNOWN 0.0

drm/radeon: free iio for atombios when driver shutdown

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm/radeon: free iio for atombios when driver shutdown Fix below kmemleak when unload radeon driver: unreferenced object 0xffff9f8608ede200 (size 512): comm "systemd-udevd", pid 326, jiffies 4294682822 (age 716.338s) hex dump (first 32 bytes): 00 00 00 00 c4 aa ec aa 14 ab 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000062fadebe>] kmem_cache_alloc_trace+0x2f1/0x500 [<00000000b6883cea>] atom_parse+0x117/0x230 [radeon] [<00000000158c23fd>] radeon_atombios_init+0xab/0x170 [radeon] [<00000000683f672e>] si_init+0x57/0x750 [radeon] [<00000000566cc31f>] radeon_device_init+0x559/0x9c0 [radeon] [<0000000046efabb3>] radeon_driver_load_kms+0xc1/0x1a0 [radeon] [<00000000b5155064>] drm_dev_register+0xdd/0x1d0 [<0000000045fec835>] radeon_pci_probe+0xbd/0x100 [radeon] [<00000000e69ecca3>] pci_device_probe+0xe1/0x160 [<0000000019484b76>] really_probe.part.0+0xc1/0x2c0 [<000000003f2649da>] __driver_probe_device+0x96/0x130 [<00000000231c5bb1>] driver_probe_device+0x24/0xf0 [<0000000000a42377>] __driver_attach+0x77/0x190 [<00000000d7574da6>] bus_for_each_dev+0x7f/0xd0 [<00000000633166d2>] driver_attach+0x1e/0x30 [<00000000313b05b8>] bus_add_driver+0x12c/0x1e0 iio was allocated in atom_index_iio() called by atom_parse(), but it doesn't got released when the dirver is shutdown. Fix this kmemleak by free it in radeon_atombios_fini().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
771fe6b912fca54f03e8a72eb63058b582775362 < cb109cedbba11c33473e6780c256d8442a9e4460 771fe6b912fca54f03e8a72eb63058b582775362 < 9cdb96b55651c92fc949cfd54124406c3c912b6b 771fe6b912fca54f03e8a72eb63058b582775362 < f9f55fc64928b5e30d78f861c5fc76db9e769ebb 771fe6b912fca54f03e8a72eb63058b582775362 < ce9e9d3dcbb0d1551ffd1a7f16e7c051f3ba4140 771fe6b912fca54f03e8a72eb63058b582775362 < cda2f7efbc2d857220dad32e315a54565b285c1c 771fe6b912fca54f03e8a72eb63058b582775362 < 107b8b542bb9dab4cbdc3276c85fbdd7f6782313 771fe6b912fca54f03e8a72eb63058b582775362 < e2791f2f4d1d804e45fa91b14295c326b64c65f1 771fe6b912fca54f03e8a72eb63058b582775362 < 4773fadedca918faec443daaca5e4ea1c0ced144
Linux / Linux
2.6.31

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/cb109cedbba11c33473e6780c256d8442a9e4460 git.kernel.org: https://git.kernel.org/stable/c/9cdb96b55651c92fc949cfd54124406c3c912b6b git.kernel.org: https://git.kernel.org/stable/c/f9f55fc64928b5e30d78f861c5fc76db9e769ebb git.kernel.org: https://git.kernel.org/stable/c/ce9e9d3dcbb0d1551ffd1a7f16e7c051f3ba4140 git.kernel.org: https://git.kernel.org/stable/c/cda2f7efbc2d857220dad32e315a54565b285c1c git.kernel.org: https://git.kernel.org/stable/c/107b8b542bb9dab4cbdc3276c85fbdd7f6782313 git.kernel.org: https://git.kernel.org/stable/c/e2791f2f4d1d804e45fa91b14295c326b64c65f1 git.kernel.org: https://git.kernel.org/stable/c/4773fadedca918faec443daaca5e4ea1c0ced144