CVE-2023-53193
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
15/09/2025
Última modificación:
02/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v10_0_hw_fini<br />
<br />
The gmc.ecc_irq is enabled by firmware per IFWI setting,<br />
and the host driver is not privileged to enable/disable<br />
the interrupt. So, it is meaningless to use the amdgpu_irq_put<br />
function in gmc_v10_0_hw_fini, which also leads to the call<br />
trace.<br />
<br />
[ 82.340264] Call Trace:<br />
[ 82.340265] <br />
[ 82.340269] gmc_v10_0_hw_fini+0x83/0xa0 [amdgpu]<br />
[ 82.340447] gmc_v10_0_suspend+0xe/0x20 [amdgpu]<br />
[ 82.340623] amdgpu_device_ip_suspend_phase2+0x127/0x1c0 [amdgpu]<br />
[ 82.340789] amdgpu_device_ip_suspend+0x3d/0x80 [amdgpu]<br />
[ 82.340955] amdgpu_device_pre_asic_reset+0xdd/0x2b0 [amdgpu]<br />
[ 82.341122] amdgpu_device_gpu_recover.cold+0x4dd/0xbb2 [amdgpu]<br />
[ 82.341359] amdgpu_debugfs_reset_work+0x4c/0x70 [amdgpu]<br />
[ 82.341529] process_one_work+0x21d/0x3f0<br />
[ 82.341535] worker_thread+0x1fa/0x3c0<br />
[ 82.341538] ? process_one_work+0x3f0/0x3f0<br />
[ 82.341540] kthread+0xff/0x130<br />
[ 82.341544] ? kthread_complete_and_exit+0x20/0x20<br />
[ 82.341547] ret_from_fork+0x22/0x30
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.26 (incluyendo) | 6.1.29 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2.13 (incluyendo) | 6.2.16 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.3.1 (incluyendo) | 6.3.3 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:6.3:-:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



