DEBIAN-CVE-2023-54144

Source
https://security-tracker.debian.org/tracker/CVE-2023-54144
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54144.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-54144
Upstream
Published
2025-12-24T13:16:16.413Z
Modified
2025-12-25T11:19:54.512122Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix kernel warning during topology setup This patch fixes the following kernel warning seen during driver load by correctly initializing the p2plink attr before creating the sysfs file: [ +0.002865] ------------[ cut here ]------------ [ +0.002327] kobject: '(null)' (0000000056260cfb): is not initialized, yet kobjectput() is being called. [ +0.004780] WARNING: CPU: 32 PID: 1006 at lib/kobject.c:718 kobjectput+0xaa/0x1c0 [ +0.001361] Call Trace: [ +0.001234] <TASK> [ +0.001067] kfdremovesysfsnodeentry+0x24a/0x2d0 [amdgpu] [ +0.003147] kfdtopologyupdatesysfs+0x3d/0x750 [amdgpu] [ +0.002890] kfdtopologyadddevice+0xbd7/0xc70 [amdgpu] [ +0.002844] ? lockrelease+0x13c/0x2e0 [ +0.001936] ? smucmnsendsmcmsgwithparam+0x1e8/0x2d0 [amdgpu] [ +0.003313] ? amdgpudpmgetmclk+0x54/0x60 [amdgpu] [ +0.002703] kgd2kfddeviceinit.cold+0x39f/0x4ed [amdgpu] [ +0.002930] amdgpuamdkfddeviceinit+0x13d/0x1f0 [amdgpu] [ +0.002944] amdgpudeviceinit.cold+0x1464/0x17b4 [amdgpu] [ +0.002970] ? pcibusreadconfigword+0x43/0x80 [ +0.002380] amdgpudriverloadkms+0x15/0x100 [amdgpu] [ +0.002744] amdgpupciprobe+0x147/0x370 [amdgpu] [ +0.002522] localpciprobe+0x40/0x80 [ +0.001896] workforcpufn+0x10/0x20 [ +0.001892] processonework+0x26e/0x5a0 [ +0.002029] workerthread+0x1fd/0x3e0 [ +0.001890] ? processonework+0x5a0/0x5a0 [ +0.002115] kthread+0xea/0x110 [ +0.001618] ? kthreadcompleteandexit+0x20/0x20 [ +0.002422] retfromfork+0x1f/0x30 [ +0.001808] </TASK> [ +0.001103] irq event stamp: 59837 [ +0.001718] hardirqs last enabled at (59849): [<ffffffffb30fab12>] _upconsolesem+0x52/0x60 [ +0.004414] hardirqs last disabled at (59860): [<ffffffffb30faaf7>] _upconsolesem+0x37/0x60 [ +0.004414] softirqs last enabled at (59654): [<ffffffffb307d9c7>] irqexitrcu+0xd7/0x130 [ +0.004205] softirqs last disabled at (59649): [<ffffffffb307d9c7>] irqexit_rcu+0xd7/0x130 [ +0.004203] ---[ end trace 0000000000000000 ]---

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54144.json"

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54144.json"

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54144.json"