{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2023-52587","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-03-02T21:55:42.570Z","datePublished":"2024-03-06T06:45:21.418Z","dateUpdated":"2026-01-05T10:16:23.578Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-01-05T10:16:23.578Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nIB/ipoib: Fix mcast list locking\n\nReleasing the `priv->lock` while iterating the `priv->multicast_list` in\n`ipoib_mcast_join_task()` opens a window for `ipoib_mcast_dev_flush()` to\nremove the items while in the middle of iteration. If the mcast is removed\nwhile the lock was dropped, the for loop spins forever resulting in a hard\nlockup (as was reported on RHEL 4.18.0-372.75.1.el8_6 kernel):\n\n    Task A (kworker/u72:2 below)       | Task B (kworker/u72:0 below)\n    -----------------------------------+-----------------------------------\n    ipoib_mcast_join_task(work)        | ipoib_ib_dev_flush_light(work)\n      spin_lock_irq(&priv->lock)       | __ipoib_ib_dev_flush(priv, ...)\n      list_for_each_entry(mcast,       | ipoib_mcast_dev_flush(dev = priv->dev)\n          &priv->multicast_list, list) |\n        ipoib_mcast_join(dev, mcast)   |\n          spin_unlock_irq(&priv->lock) |\n                                       |   spin_lock_irqsave(&priv->lock, flags)\n                                       |   list_for_each_entry_safe(mcast, tmcast,\n                                       |                  &priv->multicast_list, list)\n                                       |     list_del(&mcast->list);\n                                       |     list_add_tail(&mcast->list, &remove_list)\n                                       |   spin_unlock_irqrestore(&priv->lock, flags)\n          spin_lock_irq(&priv->lock)   |\n                                       |   ipoib_mcast_remove_list(&remove_list)\n   (Here, `mcast` is no longer on the  |     list_for_each_entry_safe(mcast, tmcast,\n    `priv->multicast_list` and we keep |                            remove_list, list)\n    spinning on the `remove_list` of   |  >>>  wait_for_completion(&mcast->done)\n    the other thread which is blocked  |\n    and the list is still valid on     |\n    it's stack.)\n\nFix this by keeping the lock held and changing to GFP_ATOMIC to prevent\neventual sleeps.\nUnfortunately we could not reproduce the lockup and confirm this fix but\nbased on the code review I think this fix should address such lockups.\n\ncrash> bc 31\nPID: 747      TASK: ff1c6a1a007e8000  CPU: 31   COMMAND: \"kworker/u72:2\"\n--\n    [exception RIP: ipoib_mcast_join_task+0x1b1]\n    RIP: ffffffffc0944ac1  RSP: ff646f199a8c7e00  RFLAGS: 00000002\n    RAX: 0000000000000000  RBX: ff1c6a1a04dc82f8  RCX: 0000000000000000\n                                  work (&priv->mcast_task{,.work})\n    RDX: ff1c6a192d60ac68  RSI: 0000000000000286  RDI: ff1c6a1a04dc8000\n           &mcast->list\n    RBP: ff646f199a8c7e90   R8: ff1c699980019420   R9: ff1c6a1920c9a000\n    R10: ff646f199a8c7e00  R11: ff1c6a191a7d9800  R12: ff1c6a192d60ac00\n                                                         mcast\n    R13: ff1c6a1d82200000  R14: ff1c6a1a04dc8000  R15: ff1c6a1a04dc82d8\n           dev                    priv (&priv->lock)     &priv->multicast_list (aka head)\n    ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018\n--- <NMI exception stack> ---\n #5 [ff646f199a8c7e00] ipoib_mcast_join_task+0x1b1 at ffffffffc0944ac1 [ib_ipoib]\n #6 [ff646f199a8c7e98] process_one_work+0x1a7 at ffffffff9bf10967\n\ncrash> rx ff646f199a8c7e68\nff646f199a8c7e68:  ff1c6a1a04dc82f8 <<< work = &priv->mcast_task.work\n\ncrash> list -hO ipoib_dev_priv.multicast_list ff1c6a1a04dc8000\n(empty)\n\ncrash> ipoib_dev_priv.mcast_task.work.func,mcast_mutex.owner.counter ff1c6a1a04dc8000\n  mcast_task.work.func = 0xffffffffc0944910 <ipoib_mcast_join_task>,\n  mcast_mutex.owner.counter = 0xff1c69998efec000\n\ncrash> b 8\nPID: 8        TASK: ff1c69998efec000  CPU: 33   COMMAND: \"kworker/u72:0\"\n--\n #3 [ff646f1980153d50] wait_for_completion+0x96 at ffffffff9c7d7646\n #4 [ff646f1980153d90] ipoib_mcast_remove_list+0x56 at ffffffffc0944dc6 [ib_ipoib]\n #5 [ff646f1980153de8] ipoib_mcast_dev_flush+0x1a7 at ffffffffc09455a7 [ib_ipoib]\n #6 [ff646f1980153e58] __ipoib_ib_dev_flush+0x1a4 at ffffffffc09431a4 [ib_ipoib]\n #7 [ff\n---truncated---"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/infiniband/ulp/ipoib/ipoib_multicast.c"],"versions":[{"version":"d2fe937ce6ce23daf5fb214e45432dbb631581b7","lessThan":"4c8922ae8eb8dcc1e4b7d1059d97a8334288d825","status":"affected","versionType":"git"},{"version":"d2fe937ce6ce23daf5fb214e45432dbb631581b7","lessThan":"615e3adc2042b7be4ad122a043fc9135e6342c90","status":"affected","versionType":"git"},{"version":"d2fe937ce6ce23daf5fb214e45432dbb631581b7","lessThan":"ac2630fd3c90ffec34a0bfc4d413668538b0e8f2","status":"affected","versionType":"git"},{"version":"d2fe937ce6ce23daf5fb214e45432dbb631581b7","lessThan":"ed790bd0903ed3352ebf7f650d910f49b7319b34","status":"affected","versionType":"git"},{"version":"d2fe937ce6ce23daf5fb214e45432dbb631581b7","lessThan":"5108a2dc2db5630fb6cd58b8be80a0c134bc310a","status":"affected","versionType":"git"},{"version":"d2fe937ce6ce23daf5fb214e45432dbb631581b7","lessThan":"342258fb46d66c1b4c7e2c3717ac01e10c03cf18","status":"affected","versionType":"git"},{"version":"d2fe937ce6ce23daf5fb214e45432dbb631581b7","lessThan":"7c7bd4d561e9dc6f5b7df9e184974915f6701a89","status":"affected","versionType":"git"},{"version":"d2fe937ce6ce23daf5fb214e45432dbb631581b7","lessThan":"4f973e211b3b1c6d36f7c6a19239d258856749f9","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/infiniband/ulp/ipoib/ipoib_multicast.c"],"versions":[{"version":"4.1","status":"affected"},{"version":"0","lessThan":"4.1","status":"unaffected","versionType":"semver"},{"version":"4.19.307","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.269","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.210","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.149","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.77","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.16","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.7.4","lessThanOrEqual":"6.7.*","status":"unaffected","versionType":"semver"},{"version":"6.8","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.1","versionEndExcluding":"4.19.307"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.1","versionEndExcluding":"5.4.269"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.1","versionEndExcluding":"5.10.210"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.1","versionEndExcluding":"5.15.149"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.1","versionEndExcluding":"6.1.77"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.1","versionEndExcluding":"6.6.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.1","versionEndExcluding":"6.7.4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.1","versionEndExcluding":"6.8"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/4c8922ae8eb8dcc1e4b7d1059d97a8334288d825"},{"url":"https://git.kernel.org/stable/c/615e3adc2042b7be4ad122a043fc9135e6342c90"},{"url":"https://git.kernel.org/stable/c/ac2630fd3c90ffec34a0bfc4d413668538b0e8f2"},{"url":"https://git.kernel.org/stable/c/ed790bd0903ed3352ebf7f650d910f49b7319b34"},{"url":"https://git.kernel.org/stable/c/5108a2dc2db5630fb6cd58b8be80a0c134bc310a"},{"url":"https://git.kernel.org/stable/c/342258fb46d66c1b4c7e2c3717ac01e10c03cf18"},{"url":"https://git.kernel.org/stable/c/7c7bd4d561e9dc6f5b7df9e184974915f6701a89"},{"url":"https://git.kernel.org/stable/c/4f973e211b3b1c6d36f7c6a19239d258856749f9"}],"title":"IB/ipoib: Fix mcast list locking","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-52587","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-03-08T18:50:41.278526Z"}}}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:23:13.749Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:03:21.201Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/4c8922ae8eb8dcc1e4b7d1059d97a8334288d825","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/615e3adc2042b7be4ad122a043fc9135e6342c90","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/ac2630fd3c90ffec34a0bfc4d413668538b0e8f2","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/ed790bd0903ed3352ebf7f650d910f49b7319b34","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/5108a2dc2db5630fb6cd58b8be80a0c134bc310a","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/342258fb46d66c1b4c7e2c3717ac01e10c03cf18","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/7c7bd4d561e9dc6f5b7df9e184974915f6701a89","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/4f973e211b3b1c6d36f7c6a19239d258856749f9","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","tags":["x_transferred"]}]}]},"dataVersion":"5.2"}