{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T02:31:49.797","vulnerabilities":[{"cve":{"id":"CVE-2023-53707","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-10-22T14:15:45.303","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix integer overflow in amdgpu_cs_pass1\n\nThe type of size is unsigned int, if size is 0x40000000, there will\nbe an integer overflow, size will be zero after size *= sizeof(uint32_t),\nwill cause uninitialized memory to be referenced later."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/87c2213e85bd81e4a9a4d0880c256568794ae388","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/9f55d300541cb5b435984d269087810581580b00","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/c3deb091398e9e469d08dd1599b6d76fd6b29df8","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}