{
  "threat_severity" : "Low",
  "public_date" : "2025-09-18T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: Linux kernel: Denial of Service due to GIC state corruption on NVIDIA T241 platforms",
    "id" : "2396396",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2396396"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-821",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nirqchip/gicv3: Workaround for NVIDIA erratum T241-FABRIC-4\nThe T241 platform suffers from the T241-FABRIC-4 erratum which causes\nunexpected behavior in the GIC when multiple transactions are received\nsimultaneously from different sources. This hardware issue impacts\nNVIDIA server platforms that use more than two T241 chips\ninterconnected. Each chip has support for 320 {E}SPIs.\nThis issue occurs when multiple packets from different GICs are\nincorrectly interleaved at the target chip. The erratum text below\nspecifies exactly what can cause multiple transfer packets susceptible\nto interleaving and GIC state corruption. GIC state corruption can\nlead to a range of problems, including kernel panics, and unexpected\nbehavior.\n>From the erratum text:\n\"In some cases, inter-socket AXI4 Stream packets with multiple\ntransfers, may be interleaved by the fabric when presented to ARM\nGeneric Interrupt Controller. GIC expects all transfers of a packet\nto be delivered without any interleaving.\nThe following GICv3 commands may result in multiple transfer packets\nover inter-socket AXI4 Stream interface:\n- Register reads from GICD_I* and GICD_N*\n- Register writes to 64-bit GICD registers other than GICD_IROUTERn*\n- ITS command MOVALL\nMultiple commands in GICv4+ utilize multiple transfer packets,\nincluding VMOVP, VMOVI, VMAPP, and 64-bit register accesses.\"\nThis issue impacts system configurations with more than 2 sockets,\nthat require multi-transfer packets to be sent over inter-socket\nAXI4 Stream interface between GIC instances on different sockets.\nGICv4 cannot be supported. GICv3 SW model can only be supported\nwith the workaround. Single and Dual socket configurations are not\nimpacted by this issue and support GICv3 and GICv4.\"\nWriting to the chip alias region of the GICD_In{E} registers except\nGICD_ICENABLERn has an equivalent effect as writing to the global\ndistributor. The SPI interrupt deactivate path is not impacted by\nthe erratum.\nTo fix this problem, implement a workaround that ensures read accesses\nto the GICD_In{E} registers are directed to the chip that owns the\nSPI, and disable GICv4.x features. To simplify code changes, the\ngic_configure_irq() function uses the same alias region for both read\nand write operations to GICD_ICFGR.", "A flaw was found in the Linux kernel. On NVIDIA server platforms utilizing multiple interconnected T241 chips, a local user could trigger a vulnerability in the Generic Interrupt Controller (GIC) due to incorrect handling of inter-socket data packets. This can corrupt the GIC's internal state, leading to system instability, including kernel panics, and ultimately a Denial of Service (DoS)." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-09-12T00:00:00Z",
    "advisory" : "RHSA-2023:5069",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-284.30.1.el9_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-11-07T00:00:00Z",
    "advisory" : "RHSA-2023:6583",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-362.8.1.el9_3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-09-12T00:00:00Z",
    "advisory" : "RHSA-2023:5069",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-284.30.1.el9_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-11-07T00:00:00Z",
    "advisory" : "RHSA-2023:6583",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-362.8.1.el9_3"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-53383\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53383\nhttps://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53383-fea9@gregkh/T" ],
  "name" : "CVE-2023-53383",
  "csaw" : false
}