CVE-2023-54144

Source
https://cve.org/CVERecord?id=CVE-2023-54144
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54144.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54144
Downstream
Related
Published
2025-12-24T13:06:57.546Z
Modified
2026-01-30T01:38:33.300854Z
Summary
drm/amdkfd: Fix kernel warning during topology setup
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix kernel warning during topology setup

This patch fixes the following kernel warning seen during driver load by correctly initializing the p2plink attr before creating the sysfs file:

[ +0.002865] ------------[ cut here ]------------ [ +0.002327] kobject: '(null)' (0000000056260cfb): is not initialized, yet kobjectput() is being called. [ +0.004780] WARNING: CPU: 32 PID: 1006 at lib/kobject.c:718 kobjectput+0xaa/0x1c0 [ +0.001361] Call Trace: [ +0.001234] <TASK> [ +0.001067] kfdremovesysfsnodeentry+0x24a/0x2d0 [amdgpu] [ +0.003147] kfdtopologyupdatesysfs+0x3d/0x750 [amdgpu] [ +0.002890] kfdtopologyadddevice+0xbd7/0xc70 [amdgpu] [ +0.002844] ? lockrelease+0x13c/0x2e0 [ +0.001936] ? smucmnsendsmcmsgwithparam+0x1e8/0x2d0 [amdgpu] [ +0.003313] ? amdgpudpmgetmclk+0x54/0x60 [amdgpu] [ +0.002703] kgd2kfddeviceinit.cold+0x39f/0x4ed [amdgpu] [ +0.002930] amdgpuamdkfddeviceinit+0x13d/0x1f0 [amdgpu] [ +0.002944] amdgpudeviceinit.cold+0x1464/0x17b4 [amdgpu] [ +0.002970] ? pcibusreadconfigword+0x43/0x80 [ +0.002380] amdgpudriverloadkms+0x15/0x100 [amdgpu] [ +0.002744] amdgpupciprobe+0x147/0x370 [amdgpu] [ +0.002522] localpciprobe+0x40/0x80 [ +0.001896] workforcpufn+0x10/0x20 [ +0.001892] processonework+0x26e/0x5a0 [ +0.002029] workerthread+0x1fd/0x3e0 [ +0.001890] ? processonework+0x5a0/0x5a0 [ +0.002115] kthread+0xea/0x110 [ +0.001618] ? kthreadcompleteandexit+0x20/0x20 [ +0.002422] retfromfork+0x1f/0x30 [ +0.001808] </TASK> [ +0.001103] irq event stamp: 59837 [ +0.001718] hardirqs last enabled at (59849): [<ffffffffb30fab12>] _upconsolesem+0x52/0x60 [ +0.004414] hardirqs last disabled at (59860): [<ffffffffb30faaf7>] _upconsolesem+0x37/0x60 [ +0.004414] softirqs last enabled at (59654): [<ffffffffb307d9c7>] irqexitrcu+0xd7/0x130 [ +0.004205] softirqs last disabled at (59649): [<ffffffffb307d9c7>] irqexit_rcu+0xd7/0x130 [ +0.004203] ---[ end trace 0000000000000000 ]---

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54144.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0f28cca87e9afc22280c44d378d2a6e249933977
Fixed
2d5a6742a242091292cc0a2b607be701a45d0c4e
Fixed
306888b1246bf44e703b6f1ccc746c2746c1a981
Fixed
cf97eb7e47d4671084c7e114c5d88a3d0540ecbd

Affected versions

v5.*
v5.18
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v6.*
v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.0.1
v6.0.10
v6.0.11
v6.0.12
v6.0.13
v6.0.14
v6.0.15
v6.0.16
v6.0.17
v6.0.18
v6.0.2
v6.0.3
v6.0.4
v6.0.5
v6.0.6
v6.0.7
v6.0.8
v6.0.9
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.2
v6.1.3
v6.1.4
v6.2-rc1
v6.2-rc2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54144.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.0.0
Fixed
6.0.19
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54144.json"