CVE-2023-53723Linux vulnerability

6 documents5 sources
Severity
N/A
No vector
EPSS
0.0%
top 88.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 22

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend sdma_v4_0_ip is shared on a few asics, but in sdma_v4_0_hw_fini, driver unconditionally disables ecc_irq which is only enabled on those asics enabling sdma ecc. This will introduce a warning in suspend cycle on those chips with sdma ip v4.0, while without sdma ecc. So this patch correct this. [ 7283.166354] RIP: 0010:amdgpu_irq_put+0x45/0x70 [amdgpu] [

Affected Packages4 packages

Linuxlinux/linux_kernel4.2.05.4.243+5
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linuxd38ceaf99ed015f2a0b9af3499791bd3a3daae213decf3a750a924362bf4e2680dd3b07242fe56e8+7
debiandebian/linux< linux 6.1.37-1 (bookworm)

🔴Vulnerability Details

3
OSV
drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend2025-10-22
OSV
CVE-2023-53723: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend sdma_v4_2025-10-22
GHSA
GHSA-jp5p-q34f-m2gw: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend sdma_v2025-10-22

📋Vendor Advisories

2
Red Hat
kernel: drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend2025-10-22
Debian
CVE-2023-53723: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu:...2023