CVE-2023-52632

CVE Details

Release Date:2024-04-02
Impact:Low What is this?

Description


In the Linux kernel, the following vulnerability has been resolved:\ndrm/amdkfd: Fix lock dependency warning with srcu\n======================================================\nWARNING: possible circular locking dependency detected\n6.5.0-kfd-yangp #2289 Not tainted\n------------------------------------------------------\nkworker/0:2/996 is trying to acquire lock:\n(srcu){.+.+}-{0:0}, at: __synchronize_srcu+0x5/0x1a0\nbut task is already holding lock:\n((work_completion)(&svms->deferred_list_work)){+.+.}-{0:0}, at:\nprocess_one_work+0x211/0x560\nwhich lock already depends on the new lock.\nthe existing dependency chain (in reverse order) is:\n-> #3 ((work_completion)(&svms->deferred_list_work)){+.+.}-{0:0}:\n__flush_work+0x88/0x4f0\nsvm_range_list_lock_and_flush_work+0x3d/0x110 [amdgpu]\nsvm_range_set_attr+0xd6/0x14c0 [amdgpu]\nkfd_ioctl+0x1d1/0x630 [amdgpu]\n__x64_sys_ioctl+0x88/0xc0\n-> #2 (&info->lock#2){+.+.}-{3:3}:\n__mutex_lock+0x99/0xc70\namdgpu_amdkfd_gpuvm_restore_process_bos+0x54/0x740 [amdgpu]\nrestore_process_helper+0x22/0x80 [amdgpu]\nrestore_process_worker+0x2d/0xa0 [amdgpu]\nprocess_one_work+0x29b/0x560\nworker_thread+0x3d/0x3d0\n-> #1 ((work_completion)(&(&process->restore_work)->work)){+.+.}-{0:0}:\n__flush_work+0x88/0x4f0\n__cancel_work_timer+0x12c/0x1c0\nkfd_process_notifier_release_internal+0x37/0x1f0 [amdgpu]\n__mmu_notifier_release+0xad/0x240\nexit_mmap+0x6a/0x3a0\nmmput+0x6a/0x120\ndo_exit+0x322/0xb90\ndo_group_exit+0x37/0xa0\n__x64_sys_exit_group+0x18/0x20\ndo_syscall_64+0x38/0x80\n-> #0 (srcu){.+.+}-{0:0}:\n__lock_acquire+0x1521/0x2510\nlock_sync+0x5f/0x90\n__synchronize_srcu+0x4f/0x1a0\n__mmu_notifier_release+0x128/0x240\nexit_mmap+0x6a/0x3a0\nmmput+0x6a/0x120\nsvm_range_deferred_list_work+0x19f/0x350 [amdgpu]\nprocess_one_work+0x29b/0x560\nworker_thread+0x3d/0x3d0\nother info that might help us debug this:\nChain exists of:\nsrcu --> &info->lock#2 --> (work_completion)(&svms->deferred_list_work)\nPossible unsafe locking scenario:\nCPU0 CPU1\n---- ----\nlock((work_completion)(&svms->deferred_list_work));\nlock(&info->lock#2);\nlock((work_completion)(&svms->deferred_list_work));\nsync(srcu);

See more information about CVE-2023-52632 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v3 metrics

Base Score: 4.4
Vector String: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Attack Vector: Local
Attack Complexity: Low
Privileges Required: High
User Interaction: None
Scope: Unchanged
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 9 (kernel)ELSA-2024-93152024-11-14


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete