{
  "threat_severity" : "Moderate",
  "public_date" : "2025-10-01T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: drm/radeon: free iio for atombios when driver shutdown",
    "id" : "2400769",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2400769"
  },
  "cvss3" : {
    "cvss3_base_score" : "4.1",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\ndrm/radeon: free iio for atombios when driver shutdown\nFix below kmemleak when unload radeon driver:\nunreferenced object 0xffff9f8608ede200 (size 512):\ncomm \"systemd-udevd\", pid 326, jiffies 4294682822 (age 716.338s)\nhex dump (first 32 bytes):\n00 00 00 00 c4 aa ec aa 14 ab 00 00 00 00 00 00  ................\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\nbacktrace:\n[<0000000062fadebe>] kmem_cache_alloc_trace+0x2f1/0x500\n[<00000000b6883cea>] atom_parse+0x117/0x230 [radeon]\n[<00000000158c23fd>] radeon_atombios_init+0xab/0x170 [radeon]\n[<00000000683f672e>] si_init+0x57/0x750 [radeon]\n[<00000000566cc31f>] radeon_device_init+0x559/0x9c0 [radeon]\n[<0000000046efabb3>] radeon_driver_load_kms+0xc1/0x1a0 [radeon]\n[<00000000b5155064>] drm_dev_register+0xdd/0x1d0\n[<0000000045fec835>] radeon_pci_probe+0xbd/0x100 [radeon]\n[<00000000e69ecca3>] pci_device_probe+0xe1/0x160\n[<0000000019484b76>] really_probe.part.0+0xc1/0x2c0\n[<000000003f2649da>] __driver_probe_device+0x96/0x130\n[<00000000231c5bb1>] driver_probe_device+0x24/0xf0\n[<0000000000a42377>] __driver_attach+0x77/0x190\n[<00000000d7574da6>] bus_for_each_dev+0x7f/0xd0\n[<00000000633166d2>] driver_attach+0x1e/0x30\n[<00000000313b05b8>] bus_add_driver+0x12c/0x1e0\niio was allocated in atom_index_iio() called by atom_parse(),\nbut it doesn't got released when the dirver is shutdown.\nFix this kmemleak by free it in radeon_atombios_fini()." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2023-11-14T00:00:00Z",
    "advisory" : "RHSA-2023:7077",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "kernel-0:4.18.0-513.5.1.el8_9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-11-07T00:00:00Z",
    "advisory" : "RHSA-2023:6583",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-362.8.1.el9_3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-11-07T00:00:00Z",
    "advisory" : "RHSA-2023:6583",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-362.8.1.el9_3"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-53453\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53453\nhttps://lore.kernel.org/linux-cve-announce/2025100104-CVE-2023-53453-c36d@gregkh/T" ],
  "name" : "CVE-2023-53453",
  "csaw" : false
}