{
  "threat_severity" : "Low",
  "public_date" : "2024-04-02T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: drm/amdkfd: lock dependency warning with srcu",
    "id" : "2272804",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2272804"
  },
  "cvss3" : {
    "cvss3_base_score" : "4.4",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-667",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\ndrm/amdkfd: Fix lock dependency warning with srcu\n======================================================\nWARNING: possible circular locking dependency detected\n6.5.0-kfd-yangp #2289 Not tainted\n------------------------------------------------------\nkworker/0:2/996 is trying to acquire lock:\n(srcu){.+.+}-{0:0}, at: __synchronize_srcu+0x5/0x1a0\nbut task is already holding lock:\n((work_completion)(&svms->deferred_list_work)){+.+.}-{0:0}, at:\nprocess_one_work+0x211/0x560\nwhich lock already depends on the new lock.\nthe existing dependency chain (in reverse order) is:\n-> #3 ((work_completion)(&svms->deferred_list_work)){+.+.}-{0:0}:\n__flush_work+0x88/0x4f0\nsvm_range_list_lock_and_flush_work+0x3d/0x110 [amdgpu]\nsvm_range_set_attr+0xd6/0x14c0 [amdgpu]\nkfd_ioctl+0x1d1/0x630 [amdgpu]\n__x64_sys_ioctl+0x88/0xc0\n-> #2 (&info->lock#2){+.+.}-{3:3}:\n__mutex_lock+0x99/0xc70\namdgpu_amdkfd_gpuvm_restore_process_bos+0x54/0x740 [amdgpu]\nrestore_process_helper+0x22/0x80 [amdgpu]\nrestore_process_worker+0x2d/0xa0 [amdgpu]\nprocess_one_work+0x29b/0x560\nworker_thread+0x3d/0x3d0\n-> #1 ((work_completion)(&(&process->restore_work)->work)){+.+.}-{0:0}:\n__flush_work+0x88/0x4f0\n__cancel_work_timer+0x12c/0x1c0\nkfd_process_notifier_release_internal+0x37/0x1f0 [amdgpu]\n__mmu_notifier_release+0xad/0x240\nexit_mmap+0x6a/0x3a0\nmmput+0x6a/0x120\ndo_exit+0x322/0xb90\ndo_group_exit+0x37/0xa0\n__x64_sys_exit_group+0x18/0x20\ndo_syscall_64+0x38/0x80\n-> #0 (srcu){.+.+}-{0:0}:\n__lock_acquire+0x1521/0x2510\nlock_sync+0x5f/0x90\n__synchronize_srcu+0x4f/0x1a0\n__mmu_notifier_release+0x128/0x240\nexit_mmap+0x6a/0x3a0\nmmput+0x6a/0x120\nsvm_range_deferred_list_work+0x19f/0x350 [amdgpu]\nprocess_one_work+0x29b/0x560\nworker_thread+0x3d/0x3d0\nother info that might help us debug this:\nChain exists of:\nsrcu --> &info->lock#2 --> (work_completion)(&svms->deferred_list_work)\nPossible unsafe locking scenario:\nCPU0                    CPU1\n----                    ----\nlock((work_completion)(&svms->deferred_list_work));\nlock(&info->lock#2);\nlock((work_completion)(&svms->deferred_list_work));\nsync(srcu);" ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-11-12T00:00:00Z",
    "advisory" : "RHSA-2024:9315",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-503.11.1.el9_5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-11-12T00:00:00Z",
    "advisory" : "RHSA-2024:9315",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-503.11.1.el9_5"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-52632\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52632\nhttps://lore.kernel.org/linux-cve-announce/2024040218-CVE-2023-52632-f7bb@gregkh/T" ],
  "name" : "CVE-2023-52632",
  "csaw" : false
}