CVE-2023-53547

Source
https://cve.org/CVERecord?id=CVE-2023-53547
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53547.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53547
Downstream
Related
Published
2025-10-04T15:16:54.794Z
Modified
2026-03-20T12:33:13.696358Z
Summary
drm/amdgpu: Fix sdma v4 sw fini error
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix sdma v4 sw fini error

Fix sdma v4 sw fini error for sdma 4.2.2 to solve the following general protection fault

[ +0.108196] general protection fault, probably for non-canonical address 0xd5e5a4ae79d24a32: 0000 [#1] PREEMPT SMP PTI [ +0.000018] RIP: 0010:freefwpriv+0xd/0x70 [ +0.000022] Call Trace: [ +0.000012] <TASK> [ +0.000011] releasefirmware+0x55/0x80 [ +0.000021] amdgpuucoderelease+0x11/0x20 [amdgpu] [ +0.000415] amdgpusdmadestroyinstctx+0x4f/0x90 [amdgpu] [ +0.000360] sdmav40sw_fini+0xce/0x110 [amdgpu]

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53547.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a2d3b4b81fd49b14782ce0ff68ca74e40f16609a
Fixed
210ef6cd8e634f18fd889421012192b81325b27b
Fixed
0ebc02d9ff85626a526353584526da6aa9c96792
Fixed
5e08e9c742a00384e5abe74bd40cf4dc15cb3a2e

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53547.json"