In the Linux kernel, the following vulnerability has been resolved:
Revert "IB/isert: Fix incorrect release of isert connection"
Commit: 699826f4e30a ("IB/isert: Fix incorrect release of isert connection") is causing problems on OPA when DEVICE_REMOVAL is happening.
------------[ cut here ]------------ WARNING: CPU: 52 PID: 2117247 at drivers/infiniband/core/cq.c:359 ibcqpoolcleanup+0xac/0xb0 [ibcore] Modules linked in: nfsd nfsacl targetcoreuser uio tcmfc libfc scsitransportfc tcmloop targetcorepscsi targetcoreiblock targetcorefile rpcsecgsskrb5 authrpcgss nfsv4 dnsresolver nfs lockd grace fscache netfs rfkill rpcrdma rdmaucm ibsrpt sunrpc ibisert iscsitargetmod targetcoremod opavnic ibiser libiscsi ibumad scsitransportiscsi rdmacm ibipoib iwcm ibcm hfi1(-) rdmavt ibuverbs intelraplmsr intelraplcommon sbedac ibcore x86pkgtempthermal intelpowerclamp coretemp i2ci801 mxmwmi rapl iTCOwdt ipmisi iTCOvendorsupport meime ipmidevintf mei intelcstate ioatdma inteluncore i2csmbus joydev pcspkr lpcich ipmimsghandler acpipowermeter acpipad xfs libcrc32c srmod sdmod cdrom t10pi sg crct10difpclmul crc32pclmul crc32cintel drmkmshelper drmshmemhelper ahci libahci ghashclmulniintel igb drm libata dca i2calgobit wmi fuse CPU: 52 PID: 2117247 Comm: modprobe Not tainted 6.5.0-rc1+ #1 Hardware name: Intel Corporation S2600CWR/S2600CW, BIOS SE5C610.86B.01.01.0014.121820151719 12/18/2015 RIP: 0010:ibcqpoolcleanup+0xac/0xb0 [ibcore] Code: ff 48 8b 43 40 48 8d 7b 40 48 83 e8 40 4c 39 e7 75 b3 49 83 c4 10 4d 39 fc 75 94 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc <0f> 0b eb a1 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f RSP: 0018:ffffc10bea13fc80 EFLAGS: 00010206 RAX: 000000000000010c RBX: ffff9bf5c7e66c00 RCX: 000000008020001d RDX: 000000008020001e RSI: fffff175221f9900 RDI: ffff9bf5c7e67640 RBP: ffff9bf5c7e67600 R08: ffff9bf5c7e64400 R09: 000000008020001d R10: 0000000040000000 R11: 0000000000000000 R12: ffff9bee4b1e8a18 R13: dead000000000122 R14: dead000000000100 R15: ffff9bee4b1e8a38 FS: 00007ff1e6d38740(0000) GS:ffff9bfd9fb00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005652044ecc68 CR3: 0000000889b5c005 CR4: 00000000001706e0 Call Trace: <TASK> ? _warn+0x80/0x130 ? ibcqpoolcleanup+0xac/0xb0 [ibcore] ? reportbug+0x195/0x1a0 ? handlebug+0x3c/0x70 ? excinvalidop+0x14/0x70 ? asmexcinvalidop+0x16/0x20 ? ibcqpoolcleanup+0xac/0xb0 [ibcore] disabledevice+0x9d/0x160 [ibcore] _ibunregisterdevice+0x42/0xb0 [ibcore] ibunregisterdevice+0x22/0x30 [ibcore] rvtunregisterdevice+0x20/0x90 [rdmavt] hfi1unregisteribdevice+0x16/0xf0 [hfi1] removeone+0x55/0x1a0 [hfi1] pcideviceremove+0x36/0xa0 devicereleasedriverinternal+0x193/0x200 driverdetach+0x44/0x90 busremovedriver+0x69/0xf0 pciunregisterdriver+0x2a/0xb0 hfi1modcleanup+0xc/0x3c [hfi1] _dosysdeletemodule.constprop.0+0x17a/0x2f0 ? exittousermodeprepare+0xc4/0xd0 ? syscalltraceenter.constprop.0+0x126/0x1a0 dosyscall64+0x5c/0x90 ? syscallexittousermode+0x12/0x30 ? dosyscall64+0x69/0x90 ? syscallexitwork+0x103/0x130 ? syscallexittousermode+0x12/0x30 ? dosyscall64+0x69/0x90 ? excpagefault+0x65/0x150 entrySYSCALL64afterhwframe+0x6e/0xd8 RIP: 0033:0x7ff1e643f5ab Code: 73 01 c3 48 8b 0d 75 a8 1b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 b0 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 45 a8 1b 00 f7 d8 64 89 01 48 RSP: 002b:00007ffec9103cc8 EFLAGS: 00000206 ORIGRAX: 00000000000000b0 RAX: ffffffffffffffda RBX: 00005615267fdc50 RCX: 00007ff1e643f5ab RDX: 0000000000000000 RSI: 0000000000000800 RDI: 00005615267fdcb8 RBP: 00005615267fdc50 R08: 0000000000000000 R09: 0000000000000000 R10: 00007ff1e659eac0 R11: 0000000000000206 R12: 00005615267fdcb8 R13: 00000000000 ---truncated---
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54219.json",
"cna_assigner": "Linux"
}