VYPR
Unrated severityNVD Advisory· Published Oct 22, 2025· Updated Apr 15, 2026

CVE-2023-53723

CVE-2023-53723

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend

sdma_v4_0_ip is shared on a few asics, but in sdma_v4_0_hw_fini, driver unconditionally disables ecc_irq which is only enabled on those asics enabling sdma ecc. This will introduce a warning in suspend cycle on those chips with sdma ip v4.0, while without sdma ecc. So this patch correct this.

[ 7283.166354] RIP: 0010:amdgpu_irq_put+0x45/0x70 [amdgpu] [ 7283.167001] RSP: 0018:ffff9a5fc3967d08 EFLAGS: 00010246 [ 7283.167019] RAX: ffff98d88afd3770 RBX: 0000000000000001 RCX: 0000000000000000 [ 7283.167023] RDX: 0000000000000000 RSI: ffff98d89da30390 RDI: ffff98d89da20000 [ 7283.167025] RBP: ffff98d89da20000 R08: 0000000000036838 R09: 0000000000000006 [ 7283.167028] R10: ffffd5764243c008 R11: 0000000000000000 R12: ffff98d89da30390 [ 7283.167030] R13: ffff98d89da38978 R14: ffffffff999ae15a R15: ffff98d880130105 [ 7283.167032] FS: 0000000000000000(0000) GS:ffff98d996f00000(0000) knlGS:0000000000000000 [ 7283.167036] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 7283.167039] CR2: 00000000f7a9d178 CR3: 00000001c42ea000 CR4: 00000000003506e0 [ 7283.167041] Call Trace: [ 7283.167046] [ 7283.167048] sdma_v4_0_hw_fini+0x38/0xa0 [amdgpu] [ 7283.167704] amdgpu_device_ip_suspend_phase2+0x101/0x1a0 [amdgpu] [ 7283.168296] amdgpu_device_suspend+0x103/0x180 [amdgpu] [ 7283.168875] amdgpu_pmops_freeze+0x21/0x60 [amdgpu] [ 7283.169464] pci_pm_freeze+0x54/0xc0

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, a fix prevents a warning during suspend on AMD GPUs with SDMA IP v4.0 that lack SDMA ECC support.

Vulnerability

In the Linux kernel's AMDGPU driver, the sdma_v4_0_hw_fini function is shared across multiple ASICs. During the suspend cycle, the driver unconditionally disables the SDMA ECC interrupt (ecc_irq) in sdma_v4_0_hw_fini. However, this interrupt is only enabled on ASICs that support SDMA ECC (RAS). On chips with SDMA IP v4.0 that do not have SDMA ECC, this unconditional disable triggers a warning and a call trace, as shown in the kernel log [1].

Exploitation

This issue is triggered during the system suspend process. An attacker would need local access to the system and the ability to trigger a suspend cycle (e.g., via systemctl suspend or closing a laptop lid). No special privileges beyond normal user access to suspend the system are required. The vulnerability manifests as a kernel warning, not a memory corruption or privilege escalation.

Impact

The primary impact is a kernel warning and a call trace printed to the kernel log during suspend. This can cause unnecessary noise in logs and potentially disrupt automated monitoring or suspend/resume workflows. There is no evidence of data corruption, privilege escalation, or denial of service beyond the warning itself.

Mitigation

The fix, introduced in Linux kernel commits [1] and [2], modifies sdma_v4_0_hw_fini to only disable the SDMA ECC interrupt when SDMA RAS is actually enabled. Users should update to a kernel version containing this patch. No workaround is available other than avoiding suspend on affected systems.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

7

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.