CVE-2023-53723

Source
https://cve.org/CVERecord?id=CVE-2023-53723
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53723.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53723
Downstream
Related
Published
2025-10-22T13:23:53.900Z
Modified
2026-03-20T12:33:18.753969Z
Summary
drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend

sdmav40ip is shared on a few asics, but in sdmav40hwfini, driver unconditionally disables eccirq which is only enabled on those asics enabling sdma ecc. This will introduce a warning in suspend cycle on those chips with sdma ip v4.0, while without sdma ecc. So this patch correct this.

[ 7283.166354] RIP: 0010:amdgpuirqput+0x45/0x70 [amdgpu] [ 7283.167001] RSP: 0018:ffff9a5fc3967d08 EFLAGS: 00010246 [ 7283.167019] RAX: ffff98d88afd3770 RBX: 0000000000000001 RCX: 0000000000000000 [ 7283.167023] RDX: 0000000000000000 RSI: ffff98d89da30390 RDI: ffff98d89da20000 [ 7283.167025] RBP: ffff98d89da20000 R08: 0000000000036838 R09: 0000000000000006 [ 7283.167028] R10: ffffd5764243c008 R11: 0000000000000000 R12: ffff98d89da30390 [ 7283.167030] R13: ffff98d89da38978 R14: ffffffff999ae15a R15: ffff98d880130105 [ 7283.167032] FS: 0000000000000000(0000) GS:ffff98d996f00000(0000) knlGS:0000000000000000 [ 7283.167036] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 7283.167039] CR2: 00000000f7a9d178 CR3: 00000001c42ea000 CR4: 00000000003506e0 [ 7283.167041] Call Trace: [ 7283.167046] <TASK> [ 7283.167048] sdmav40hwfini+0x38/0xa0 [amdgpu] [ 7283.167704] amdgpudeviceipsuspendphase2+0x101/0x1a0 [amdgpu] [ 7283.168296] amdgpudevicesuspend+0x103/0x180 [amdgpu] [ 7283.168875] amdgpupmopsfreeze+0x21/0x60 [amdgpu] [ 7283.169464] pcipmfreeze+0x54/0xc0

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53723.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Fixed
3decf3a750a924362bf4e2680dd3b07242fe56e8
Fixed
c1420276be7a98df0074584bb9c1709cbc1a9df5
Fixed
823787470e320f90372c3ef506769520026c571f
Fixed
2a179117a3b29e7136e4045c57090a05bb97f373
Fixed
71e1f44077db83e205db70a684c1f2c5d2247174
Fixed
c5123c193696bf97fdf259c825ebfac517b54e44
Fixed
8b229ada2669b74fdae06c83fbfda5a5a99fc253

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53723.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.2.0
Fixed
5.4.243
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.180
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.112
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.29
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.16
Type
ECOSYSTEM
Events
Introduced
6.3.0
Fixed
6.3.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53723.json"