CVE-2023-54144
Kernel Warning Due to Uninitialized Kobject in AMDGPU Driver
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| amdgpu | amdgpu | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a kernel warning in the Linux kernel's amdkfd driver related to the drm/amdkfd component. It occurs during topology setup when the p2plink attribute is not properly initialized before creating a sysfs file, leading to a kernel warning and a kobject_put() call on an uninitialized kobject.
How can this vulnerability impact me? :
The impact of this vulnerability is primarily a kernel warning during driver load, which could potentially lead to instability or unexpected behavior in the amdkfd driver related to AMD GPU devices. However, no direct security impact or exploitation details are provided.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for the specific kernel warning during driver load related to the amdkfd driver. You can monitor the kernel logs for the warning message containing 'kobject: '(null)' is not initialized, yet kobject_put() is being called.' Use the command 'dmesg | grep kobject' or 'journalctl -k | grep kobject' to search for this warning in the kernel logs.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to update the Linux kernel to a version that includes the patch fixing the initialization of the p2plink attribute in the amdkfd driver, which resolves the kernel warning during topology setup.