CVE-2023-53193
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.1.26 (inc) to 6.1.29 (exc) |
| linux | linux_kernel | From 6.2.13 (inc) to 6.2.16 (exc) |
| linux | linux_kernel | From 6.3.1 (inc) to 6.3.3 (exc) |
| linux | linux_kernel | 6.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The impact of this vulnerability is related to improper handling of the gmc.ecc_irq interrupt in the amdgpu driver, which can lead to kernel call traces (errors) during hardware finalization or suspend operations. This could potentially affect system stability or GPU driver behavior but does not indicate direct security compromise or data loss.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking the system logs for the specific call trace related to the amdgpu driver. You can use the command 'dmesg | grep amdgpu' to look for the call trace lines indicating the issue, such as 'gmc_v10_0_hw_fini' and related functions in the amdgpu module.
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's amdgpu driver where the function amdgpu_irq_put is incorrectly called in the gmc_v10_0_hw_fini routine. The gmc.ecc_irq interrupt is enabled by firmware and cannot be enabled or disabled by the host driver, making the call to amdgpu_irq_put meaningless and causing a call trace (an error or unexpected behavior in the kernel).
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed, as the issue is resolved by correcting the amdgpu_irq_put call trace in the amdgpu driver. There are no configuration changes or workarounds mentioned, so applying the vendor's kernel update is the recommended step.