CVE-2023-53060

Source
https://cve.org/CVERecord?id=CVE-2023-53060
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53060.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53060
Downstream
Related
Published
2025-05-02T15:55:14.418Z
Modified
2026-04-11T12:46:40.485807Z
Summary
igb: revert rtnl_lock() that causes deadlock
Details

In the Linux kernel, the following vulnerability has been resolved:

igb: revert rtnl_lock() that causes deadlock

The commit 6faee3d4ee8b ("igb: Add lock to avoid data race") adds rtnl_lock to eliminate a false data race shown below

(FREE from device detaching) | (USE from netdev core) igbremove | igbndogetvfconfig igbdisablesriov | vf >= adapter->vfsallocatedcount? kfree(adapter->vfdata) | adapter->vfsallocatedcount = 0 | | memcpy(... adapter->vf_data[vf]

The above race will never happen and the extra rtnl_lock causes deadlock below

[ 141.420169] <TASK> [ 141.420672] __schedule+0x2dd/0x840 [ 141.421427] schedule+0x50/0xc0 [ 141.422041] schedulepreemptdisabled+0x11/0x20 [ 141.422678] __mutexlock.isra.13+0x431/0x6b0 [ 141.423324] unregisternetdev+0xe/0x20 [ 141.423578] igbvfremove+0x45/0xe0 [igbvf] [ 141.423791] pcideviceremove+0x36/0xb0 [ 141.423990] devicereleasedriverinternal+0xc1/0x160 [ 141.424270] pcistopbusdevice+0x6d/0x90 [ 141.424507] pcistopandremovebusdevice+0xe/0x20 [ 141.424789] pciiovremovevirtfn+0xba/0x120 [ 141.425452] sriovdisable+0x2f/0xf0 [ 141.425679] igbdisablesriov+0x4e/0x100 [igb] [ 141.426353] igbremove+0xa0/0x130 [igb] [ 141.426599] pcideviceremove+0x36/0xb0 [ 141.426796] devicereleasedriverinternal+0xc1/0x160 [ 141.427060] driverdetach+0x44/0x90 [ 141.427253] busremovedriver+0x55/0xe0 [ 141.427477] pciunregister_driver+0x2a/0xa0 [ 141.428296] __x64sysdeletemodule+0x141/0x2b0 [ 141.429126] ? mntputnoexpire+0x4a/0x240 [ 141.429363] ? syscalltraceenter.isra.19+0x126/0x1a0 [ 141.429653] dosyscall64+0x5b/0x80 [ 141.429847] ? exittousermodeprepare+0x14d/0x1c0 [ 141.430109] ? syscallexittousermode+0x12/0x30 [ 141.430849] ? dosyscall64+0x67/0x80 [ 141.431083] ? syscallexittousermodeprepare+0x183/0x1b0 [ 141.431770] ? syscallexittousermode+0x12/0x30 [ 141.432482] ? dosyscall64+0x67/0x80 [ 141.432714] ? excpagefault+0x64/0x140 [ 141.432911] entrySYSCALL64afterhwframe+0x72/0xdc

Since the igbdisablesriov() will call pcidisablesriov() before releasing any resources, the netdev core will synchronize the cleanup to avoid any races. This patch removes the useless rtnl_(un)lock to guarantee correctness.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53060.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5773a1e6e5ba9f62c4573c57878d154fda269bc2
Fixed
0dabb72b923e17cb3b4ac99ea1adc9ef35116930
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2e8a30c1d994d91099fa8762f504b2ac9dce2cf7
Fixed
7d845e9a485f287181ff81567c3900a8e7ad1e28
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
55197ba6d64d48f1948e6e1f52482e0e3e38e1bf
Fixed
cd1e320ac0958298c2774605ad050483f33a21f2
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0f516dcd1456b18b56a7de0c1f67b8a4aa54c2ef
Fixed
4d2626e10709ff8474ffd1a9db3cf4647569e89c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8ee44abe4cae06713db33e0a3b1e87bfb95b13ef
Fixed
66e5577cabc3d463eea540332727929d0ace41c6
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6faee3d4ee8be0f0367d0c3d826afb3571b7a5e0
Fixed
62a64645749926f9d75af82a96440941f22b046f
Fixed
de91528d8ba274c614a2265077d695c61e31fd43
Fixed
65f69851e44d71248b952a687e44759a7abb5016
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
64c0c233a88591bb23569ae12eed7f74e5bd39ce

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53060.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.14.312
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.280
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.240
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.177
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.105
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.22
Type
ECOSYSTEM
Events
Introduced
6.0.0
Fixed
6.2.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53060.json"