{"id":"CVE-2023-53723","summary":"drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend\n\nsdma_v4_0_ip is shared on a few asics, but in sdma_v4_0_hw_fini,\ndriver unconditionally disables ecc_irq which is only enabled on\nthose asics enabling sdma ecc. This will introduce a warning in\nsuspend cycle on those chips with sdma ip v4.0, while without\nsdma ecc. So this patch correct this.\n\n[ 7283.166354] RIP: 0010:amdgpu_irq_put+0x45/0x70 [amdgpu]\n[ 7283.167001] RSP: 0018:ffff9a5fc3967d08 EFLAGS: 00010246\n[ 7283.167019] RAX: ffff98d88afd3770 RBX: 0000000000000001 RCX: 0000000000000000\n[ 7283.167023] RDX: 0000000000000000 RSI: ffff98d89da30390 RDI: ffff98d89da20000\n[ 7283.167025] RBP: ffff98d89da20000 R08: 0000000000036838 R09: 0000000000000006\n[ 7283.167028] R10: ffffd5764243c008 R11: 0000000000000000 R12: ffff98d89da30390\n[ 7283.167030] R13: ffff98d89da38978 R14: ffffffff999ae15a R15: ffff98d880130105\n[ 7283.167032] FS:  0000000000000000(0000) GS:ffff98d996f00000(0000) knlGS:0000000000000000\n[ 7283.167036] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 7283.167039] CR2: 00000000f7a9d178 CR3: 00000001c42ea000 CR4: 00000000003506e0\n[ 7283.167041] Call Trace:\n[ 7283.167046]  \u003cTASK\u003e\n[ 7283.167048]  sdma_v4_0_hw_fini+0x38/0xa0 [amdgpu]\n[ 7283.167704]  amdgpu_device_ip_suspend_phase2+0x101/0x1a0 [amdgpu]\n[ 7283.168296]  amdgpu_device_suspend+0x103/0x180 [amdgpu]\n[ 7283.168875]  amdgpu_pmops_freeze+0x21/0x60 [amdgpu]\n[ 7283.169464]  pci_pm_freeze+0x54/0xc0","modified":"2026-04-02T09:44:56.086759Z","published":"2025-10-22T13:23:53.900Z","related":["SUSE-SU-2025:4111-1","SUSE-SU-2025:4139-1","SUSE-SU-2025:4149-1","SUSE-SU-2025:4320-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53723.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2a179117a3b29e7136e4045c57090a05bb97f373"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3decf3a750a924362bf4e2680dd3b07242fe56e8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/71e1f44077db83e205db70a684c1f2c5d2247174"},{"type":"WEB","url":"https://git.kernel.org/stable/c/823787470e320f90372c3ef506769520026c571f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8b229ada2669b74fdae06c83fbfda5a5a99fc253"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c1420276be7a98df0074584bb9c1709cbc1a9df5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c5123c193696bf97fdf259c825ebfac517b54e44"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53723.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53723"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d38ceaf99ed015f2a0b9af3499791bd3a3daae21"},{"fixed":"3decf3a750a924362bf4e2680dd3b07242fe56e8"},{"fixed":"c1420276be7a98df0074584bb9c1709cbc1a9df5"},{"fixed":"823787470e320f90372c3ef506769520026c571f"},{"fixed":"2a179117a3b29e7136e4045c57090a05bb97f373"},{"fixed":"71e1f44077db83e205db70a684c1f2c5d2247174"},{"fixed":"c5123c193696bf97fdf259c825ebfac517b54e44"},{"fixed":"8b229ada2669b74fdae06c83fbfda5a5a99fc253"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53723.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.2.0"},{"fixed":"5.4.243"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.180"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.112"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.29"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.2.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.3.0"},{"fixed":"6.3.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53723.json"}}],"schema_version":"1.7.5"}