CVE-2023-53471
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| amd | amdgpu | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's AMDGPU driver, specifically in the gfx9 cp_ecc_error_irq interrupt handling. The issue is that the interrupt disablement for cp_ecc_error_irq is not properly conditioned on whether legacy gfx ras is enabled. This can lead to an improper call to amdgpu_irq_put, causing a calltrace (a type of error or crash) during hardware finalization in gfx_v9_0_hw_fini. Essentially, the interrupt is disabled incorrectly, which can cause instability or crashes in the AMDGPU driver.
How can this vulnerability impact me? :
This vulnerability can cause system instability or crashes related to the AMDGPU driver in the Linux kernel. Specifically, it may lead to calltraces or errors during GPU hardware finalization or suspend operations, potentially affecting system reliability and causing unexpected behavior or downtime on systems using affected AMDGPU hardware and drivers.