CVE-2023-53723
BaseFortify
Publication date: 2025-10-22
Last updated on: 2025-10-22
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| amd | amdgpu | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability relates to the Linux kernel's amdgpu driver, specifically in how it handles disabling the ECC (Error Correcting Code) interrupt for the SDMA (System Direct Memory Access) engine during suspend. The driver unconditionally disables the ECC interrupt even on hardware where ECC is not enabled, causing warnings during the suspend cycle on certain AMD GPUs with SDMA IP version 4.0. The patch fixes this by disabling the ECC interrupt only when SDMA RAS (Reliability, Availability, and Serviceability) is enabled.
How can this vulnerability impact me? :
The impact of this vulnerability is primarily related to system stability and reliability during suspend operations on affected AMD GPUs. It can cause warnings or errors in the kernel logs during suspend cycles, which might lead to unexpected behavior or system instability on those specific hardware configurations. However, it does not indicate a security breach or data compromise.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for warning messages related to the amdgpu driver during the suspend cycle in the system logs. Specifically, look for kernel log entries showing warnings or errors involving 'amdgpu_irq_put' and 'sdma_v4_0_hw_fini'. You can use the command 'dmesg | grep amdgpu' or 'journalctl -k | grep amdgpu' to search for such messages.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the patch fixing this issue, which disables the sdma ecc irq only when sdma RAS is enabled in suspend. Until the update is applied, monitoring system logs for related warnings and avoiding suspend cycles on affected hardware may reduce impact.