Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2023-53237

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
15/09/2025
Última modificación:
15/09/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v11_0_hw_fini<br /> <br /> The gmc.ecc_irq is enabled by firmware per IFWI setting,<br /> and the host driver is not privileged to enable/disable<br /> the interrupt. So, it is meaningless to use the amdgpu_irq_put<br /> function in gmc_v11_0_hw_fini, which also leads to the call<br /> trace.<br /> <br /> [ 102.980303] Call Trace:<br /> [ 102.980303] <br /> [ 102.980304] gmc_v11_0_hw_fini+0x54/0x90 [amdgpu]<br /> [ 102.980357] gmc_v11_0_suspend+0xe/0x20 [amdgpu]<br /> [ 102.980409] amdgpu_device_ip_suspend_phase2+0x240/0x460 [amdgpu]<br /> [ 102.980459] amdgpu_device_ip_suspend+0x3d/0x80 [amdgpu]<br /> [ 102.980520] amdgpu_device_pre_asic_reset+0xd9/0x490 [amdgpu]<br /> [ 102.980573] amdgpu_device_gpu_recover.cold+0x548/0xce6 [amdgpu]<br /> [ 102.980687] amdgpu_debugfs_reset_work+0x4c/0x70 [amdgpu]<br /> [ 102.980740] process_one_work+0x21f/0x3f0<br /> [ 102.980741] worker_thread+0x200/0x3e0<br /> [ 102.980742] ? process_one_work+0x3f0/0x3f0<br /> [ 102.980743] kthread+0xfd/0x130<br /> [ 102.980743] ? kthread_complete_and_exit+0x20/0x20<br /> [ 102.980744] ret_from_fork+0x22/0x30

Impacto