CVE-2023-53383
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2023-53383 is a vulnerability in the Linux kernel related to the NVIDIA T241-FABRIC-4 erratum that affects the Generic Interrupt Controller (GIC) behavior. The issue was disclosed in September 2025 and impacts NVIDIA server platforms using more than two T241 chips interconnected (NVD).

Technical details

The vulnerability occurs when multiple packets from different GICs are incorrectly interleaved at the target chip. Each T241 chip supports 320 ESPIs, and the issue manifests when multiple transactions are received simultaneously from different sources. The problem specifically affects inter-socket AXI4 Stream packets with multiple transfers, which may be incorrectly interleaved by the fabric when presented to the ARM Generic Interrupt Controller. This affects various GICv3 commands including register reads from GICDI* and GICDN*, register writes to 64-bit GICD registers, and ITS command MOVALL (NVD).

Impact

The vulnerability can lead to GIC state corruption, resulting in kernel panics and unexpected system behavior. The issue particularly affects system configurations with more than 2 sockets that require multi-transfer packets to be sent over inter-socket AXI4 Stream interface between GIC instances on different sockets. GICv4 functionality cannot be supported, while GICv3 can only be supported with specific workarounds (NVD).

Mitigation and workarounds

The fix involves implementing a workaround that ensures read accesses to the GICDIn{E} registers are directed to the chip that owns the SPI, and disabling GICv4.x features. To simplify code changes, the gicconfigureirq() function uses the same alias region for both read and write operations to GICDICFGR. Single and Dual socket configurations are not impacted by this issue and continue to support both GICv3 and GICv4 (NVD).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40343MEDIUM6.4
  • Linux KernelLinux Kernel
  • kernel-rt-modules-internal
NoYesDec 09, 2025
CVE-2025-40342MEDIUM6.4
  • Linux KernelLinux Kernel
  • kernel-debug-modules-extra
NoYesDec 09, 2025
CVE-2025-40341MEDIUM5.1
  • Linux KernelLinux Kernel
  • linux-nvidia-tegra
NoYesDec 09, 2025
CVE-2025-40345N/AN/A
  • Linux KernelLinux Kernel
  • kernel-headers
NoYesDec 12, 2025
CVE-2025-40344N/AN/A
  • Linux KernelLinux Kernel
  • linux-azure-6.14
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management