CVE-2023-53755
Description
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: ptdma: check for null desc before calling pt_cmd_callback
Resolves a panic that can occur on AMD systems, typically during host shutdown, after the PTDMA driver had been exercised. The issue was the pt_issue_pending() function is mistakenly assuming that there will be at least one descriptor in the Submitted queue when the function is called. However, it is possible that both the Submitted and Issued queues could be empty, which could result in pt_cmd_callback() being mistakenly called with a NULL pointer. Ref: Bugzilla Bug 216856.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Linux kernel PTDMA driver null-pointer dereference panic during shutdown, fixed by adding a descriptor null check before calling pt_cmd_callback.
Vulnerability
A null-pointer dereference vulnerability exists in the Linux kernel's PTDMA (AMD Platform Trusted DMA) driver. The pt_issue_pending() function incorrectly assumes that at least one descriptor will always be present in the Submitted queue when it is invoked. However, it is possible for both the Submitted and Issued queues to be empty, leading to pt_cmd_callback() being called with a NULL pointer argument, which triggers a kernel panic [1].
Exploitation
This issue can be triggered on AMD systems after the PTDMA driver has been exercised, typically during host shutdown. An attacker with local access or the ability to trigger driver operations could potentially induce the panic condition, though the vulnerability manifests most commonly as a reliability bug rather than a direct security exploit path [1].
Impact
If successfully triggered, the bug causes a kernel panic, resulting in a denial of service (system crash). No privilege escalation or data leakage is described in the available sources [1].
Mitigation
The fix is present in the upstream Linux kernel stable tree. Administrators should apply the latest stable kernel updates to their systems. No workarounds are documented; the patch simply adds a null pointer check before calling pt_cmd_callback() to avoid the dereference [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
39284699861718ae2113702615bba023b1241Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.