In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Fix integer overflow in radeon_cs_parser_init The type of size is unsigned, if size is 0x40000000, there will be an integer overflow, size will be zero after size *= sizeof(uint32_t), will cause uninitialized memory to be referenced later
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025091642-CVE-2023-53309-005a@gregkh/T