CVE-2023-53723

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/10/2025
Last modified:
15/04/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend<br /> <br /> sdma_v4_0_ip is shared on a few asics, but in sdma_v4_0_hw_fini,<br /> driver unconditionally disables ecc_irq which is only enabled on<br /> those asics enabling sdma ecc. This will introduce a warning in<br /> suspend cycle on those chips with sdma ip v4.0, while without<br /> sdma ecc. So this patch correct this.<br /> <br /> [ 7283.166354] RIP: 0010:amdgpu_irq_put+0x45/0x70 [amdgpu]<br /> [ 7283.167001] RSP: 0018:ffff9a5fc3967d08 EFLAGS: 00010246<br /> [ 7283.167019] RAX: ffff98d88afd3770 RBX: 0000000000000001 RCX: 0000000000000000<br /> [ 7283.167023] RDX: 0000000000000000 RSI: ffff98d89da30390 RDI: ffff98d89da20000<br /> [ 7283.167025] RBP: ffff98d89da20000 R08: 0000000000036838 R09: 0000000000000006<br /> [ 7283.167028] R10: ffffd5764243c008 R11: 0000000000000000 R12: ffff98d89da30390<br /> [ 7283.167030] R13: ffff98d89da38978 R14: ffffffff999ae15a R15: ffff98d880130105<br /> [ 7283.167032] FS: 0000000000000000(0000) GS:ffff98d996f00000(0000) knlGS:0000000000000000<br /> [ 7283.167036] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> [ 7283.167039] CR2: 00000000f7a9d178 CR3: 00000001c42ea000 CR4: 00000000003506e0<br /> [ 7283.167041] Call Trace:<br /> [ 7283.167046] <br /> [ 7283.167048] sdma_v4_0_hw_fini+0x38/0xa0 [amdgpu]<br /> [ 7283.167704] amdgpu_device_ip_suspend_phase2+0x101/0x1a0 [amdgpu]<br /> [ 7283.168296] amdgpu_device_suspend+0x103/0x180 [amdgpu]<br /> [ 7283.168875] amdgpu_pmops_freeze+0x21/0x60 [amdgpu]<br /> [ 7283.169464] pci_pm_freeze+0x54/0xc0

Impact