CVE-2023-54219 (GCVE-0-2023-54219)

Vulnerability from cvelistv5 – Published: 2025-12-30 12:11 – Updated: 2025-12-30 12:11
VLAI?
Title
Revert "IB/isert: Fix incorrect release of isert connection"
Summary
In the Linux kernel, the following vulnerability has been resolved: Revert "IB/isert: Fix incorrect release of isert connection" Commit: 699826f4e30a ("IB/isert: Fix incorrect release of isert connection") is causing problems on OPA when DEVICE_REMOVAL is happening. ------------[ cut here ]------------ WARNING: CPU: 52 PID: 2117247 at drivers/infiniband/core/cq.c:359 ib_cq_pool_cleanup+0xac/0xb0 [ib_core] Modules linked in: nfsd nfs_acl target_core_user uio tcm_fc libfc scsi_transport_fc tcm_loop target_core_pscsi target_core_iblock target_core_file rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs rfkill rpcrdma rdma_ucm ib_srpt sunrpc ib_isert iscsi_target_mod target_core_mod opa_vnic ib_iser libiscsi ib_umad scsi_transport_iscsi rdma_cm ib_ipoib iw_cm ib_cm hfi1(-) rdmavt ib_uverbs intel_rapl_msr intel_rapl_common sb_edac ib_core x86_pkg_temp_thermal intel_powerclamp coretemp i2c_i801 mxm_wmi rapl iTCO_wdt ipmi_si iTCO_vendor_support mei_me ipmi_devintf mei intel_cstate ioatdma intel_uncore i2c_smbus joydev pcspkr lpc_ich ipmi_msghandler acpi_power_meter acpi_pad xfs libcrc32c sr_mod sd_mod cdrom t10_pi sg crct10dif_pclmul crc32_pclmul crc32c_intel drm_kms_helper drm_shmem_helper ahci libahci ghash_clmulni_intel igb drm libata dca i2c_algo_bit wmi fuse CPU: 52 PID: 2117247 Comm: modprobe Not tainted 6.5.0-rc1+ #1 Hardware name: Intel Corporation S2600CWR/S2600CW, BIOS SE5C610.86B.01.01.0014.121820151719 12/18/2015 RIP: 0010:ib_cq_pool_cleanup+0xac/0xb0 [ib_core] Code: ff 48 8b 43 40 48 8d 7b 40 48 83 e8 40 4c 39 e7 75 b3 49 83 c4 10 4d 39 fc 75 94 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc <0f> 0b eb a1 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f RSP: 0018:ffffc10bea13fc80 EFLAGS: 00010206 RAX: 000000000000010c RBX: ffff9bf5c7e66c00 RCX: 000000008020001d RDX: 000000008020001e RSI: fffff175221f9900 RDI: ffff9bf5c7e67640 RBP: ffff9bf5c7e67600 R08: ffff9bf5c7e64400 R09: 000000008020001d R10: 0000000040000000 R11: 0000000000000000 R12: ffff9bee4b1e8a18 R13: dead000000000122 R14: dead000000000100 R15: ffff9bee4b1e8a38 FS: 00007ff1e6d38740(0000) GS:ffff9bfd9fb00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005652044ecc68 CR3: 0000000889b5c005 CR4: 00000000001706e0 Call Trace: <TASK> ? __warn+0x80/0x130 ? ib_cq_pool_cleanup+0xac/0xb0 [ib_core] ? report_bug+0x195/0x1a0 ? handle_bug+0x3c/0x70 ? exc_invalid_op+0x14/0x70 ? asm_exc_invalid_op+0x16/0x20 ? ib_cq_pool_cleanup+0xac/0xb0 [ib_core] disable_device+0x9d/0x160 [ib_core] __ib_unregister_device+0x42/0xb0 [ib_core] ib_unregister_device+0x22/0x30 [ib_core] rvt_unregister_device+0x20/0x90 [rdmavt] hfi1_unregister_ib_device+0x16/0xf0 [hfi1] remove_one+0x55/0x1a0 [hfi1] pci_device_remove+0x36/0xa0 device_release_driver_internal+0x193/0x200 driver_detach+0x44/0x90 bus_remove_driver+0x69/0xf0 pci_unregister_driver+0x2a/0xb0 hfi1_mod_cleanup+0xc/0x3c [hfi1] __do_sys_delete_module.constprop.0+0x17a/0x2f0 ? exit_to_user_mode_prepare+0xc4/0xd0 ? syscall_trace_enter.constprop.0+0x126/0x1a0 do_syscall_64+0x5c/0x90 ? syscall_exit_to_user_mode+0x12/0x30 ? do_syscall_64+0x69/0x90 ? syscall_exit_work+0x103/0x130 ? syscall_exit_to_user_mode+0x12/0x30 ? do_syscall_64+0x69/0x90 ? exc_page_fault+0x65/0x150 entry_SYSCALL_64_after_hwframe+0x6e/0xd8 RIP: 0033:0x7ff1e643f5ab Code: 73 01 c3 48 8b 0d 75 a8 1b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 b0 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 45 a8 1b 00 f7 d8 64 89 01 48 RSP: 002b:00007ffec9103cc8 EFLAGS: 00000206 ORIG_RAX: 00000000000000b0 RAX: ffffffffffffffda RBX: 00005615267fdc50 RCX: 00007ff1e643f5ab RDX: 0000000000000000 RSI: 0000000000000800 RDI: 00005615267fdcb8 RBP: 00005615267fdc50 R08: 0000000000000000 R09: 0000000000000000 R10: 00007ff1e659eac0 R11: 0000000000000206 R12: 00005615267fdcb8 R13: 00000000000 ---truncated---
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: ccf5a1b28e2b73952e8d23126fa1abc6ff99de55 , < 77e90bd53019d4d4c9e25552b5efb06dfd8c3c82 (git)
Affected: fb4043077b51e577ecccb3233ecfb8764fcea393 , < a277b736309f923d9baff0ef166d694d348a5b96 (git)
Affected: 6718478c18a4f4923d86b81dc7e51363e1a60b03 , < 9b6296861a5a9d58aacd72c249a68b073c78bfb4 (git)
Affected: 3c97f2c9ec29ce2f61772f6120aabc852f57132e , < aa950b9835f2d004b071fd220459edd3cd0a3603 (git)
Affected: 18512de74454fba6ebd06e579f4f1a3200a9e50d , < 1bb42aca7a9611c1991a790834e2a65f3345c5e8 (git)
Affected: 277fbf63b34a377c800d25c7cfd8231ba19cffe2 , < 3f39698e7e842abc9bd2bd97bf5eeda4543db758 (git)
Affected: 699826f4e30ab76a62c238c86fbef7e826639c8d , < 4082b59705ee9e3912eaa9e15abda8e76039b681 (git)
Affected: 699826f4e30ab76a62c238c86fbef7e826639c8d , < a3189341e2f609d48f730b18c8bbbf6783233477 (git)
Affected: 699826f4e30ab76a62c238c86fbef7e826639c8d , < dfe261107c080709459c32695847eec96238852b (git)
Affected: 2f884e6df67347301e51e6be5ad4b61cc8989114 (git)
Create a notification for this product.
    Linux Linux Affected: 6.4
Unaffected: 0 , < 6.4 (semver)
Unaffected: 4.14.326 , ≤ 4.14.* (semver)
Unaffected: 4.19.295 , ≤ 4.19.* (semver)
Unaffected: 5.4.257 , ≤ 5.4.* (semver)
Unaffected: 5.10.195 , ≤ 5.10.* (semver)
Unaffected: 5.15.132 , ≤ 5.15.* (semver)
Unaffected: 6.1.53 , ≤ 6.1.* (semver)
Unaffected: 6.4.16 , ≤ 6.4.* (semver)
Unaffected: 6.5.3 , ≤ 6.5.* (semver)
Unaffected: 6.6 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/infiniband/ulp/isert/ib_isert.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "77e90bd53019d4d4c9e25552b5efb06dfd8c3c82",
              "status": "affected",
              "version": "ccf5a1b28e2b73952e8d23126fa1abc6ff99de55",
              "versionType": "git"
            },
            {
              "lessThan": "a277b736309f923d9baff0ef166d694d348a5b96",
              "status": "affected",
              "version": "fb4043077b51e577ecccb3233ecfb8764fcea393",
              "versionType": "git"
            },
            {
              "lessThan": "9b6296861a5a9d58aacd72c249a68b073c78bfb4",
              "status": "affected",
              "version": "6718478c18a4f4923d86b81dc7e51363e1a60b03",
              "versionType": "git"
            },
            {
              "lessThan": "aa950b9835f2d004b071fd220459edd3cd0a3603",
              "status": "affected",
              "version": "3c97f2c9ec29ce2f61772f6120aabc852f57132e",
              "versionType": "git"
            },
            {
              "lessThan": "1bb42aca7a9611c1991a790834e2a65f3345c5e8",
              "status": "affected",
              "version": "18512de74454fba6ebd06e579f4f1a3200a9e50d",
              "versionType": "git"
            },
            {
              "lessThan": "3f39698e7e842abc9bd2bd97bf5eeda4543db758",
              "status": "affected",
              "version": "277fbf63b34a377c800d25c7cfd8231ba19cffe2",
              "versionType": "git"
            },
            {
              "lessThan": "4082b59705ee9e3912eaa9e15abda8e76039b681",
              "status": "affected",
              "version": "699826f4e30ab76a62c238c86fbef7e826639c8d",
              "versionType": "git"
            },
            {
              "lessThan": "a3189341e2f609d48f730b18c8bbbf6783233477",
              "status": "affected",
              "version": "699826f4e30ab76a62c238c86fbef7e826639c8d",
              "versionType": "git"
            },
            {
              "lessThan": "dfe261107c080709459c32695847eec96238852b",
              "status": "affected",
              "version": "699826f4e30ab76a62c238c86fbef7e826639c8d",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "2f884e6df67347301e51e6be5ad4b61cc8989114",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/infiniband/ulp/isert/ib_isert.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.4"
            },
            {
              "lessThan": "6.4",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.326",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.295",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.257",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.195",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.132",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.53",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.4.*",
              "status": "unaffected",
              "version": "6.4.16",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.5.*",
              "status": "unaffected",
              "version": "6.5.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.6",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.326",
                  "versionStartIncluding": "4.14.319",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.295",
                  "versionStartIncluding": "4.19.287",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.257",
                  "versionStartIncluding": "5.4.248",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.195",
                  "versionStartIncluding": "5.10.185",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.132",
                  "versionStartIncluding": "5.15.118",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.53",
                  "versionStartIncluding": "6.1.35",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.4.16",
                  "versionStartIncluding": "6.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.5.3",
                  "versionStartIncluding": "6.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6",
                  "versionStartIncluding": "6.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "6.3.9",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"IB/isert: Fix incorrect release of isert connection\"\n\nCommit: 699826f4e30a (\"IB/isert: Fix incorrect release of isert connection\") is\ncausing problems on OPA when DEVICE_REMOVAL is happening.\n\n ------------[ cut here ]------------\n WARNING: CPU: 52 PID: 2117247 at drivers/infiniband/core/cq.c:359\nib_cq_pool_cleanup+0xac/0xb0 [ib_core]\n Modules linked in: nfsd nfs_acl target_core_user uio tcm_fc libfc\nscsi_transport_fc tcm_loop target_core_pscsi target_core_iblock target_core_file\nrpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs\nrfkill rpcrdma rdma_ucm ib_srpt sunrpc ib_isert iscsi_target_mod target_core_mod\nopa_vnic ib_iser libiscsi ib_umad scsi_transport_iscsi rdma_cm ib_ipoib iw_cm\nib_cm hfi1(-) rdmavt ib_uverbs intel_rapl_msr intel_rapl_common sb_edac ib_core\nx86_pkg_temp_thermal intel_powerclamp coretemp i2c_i801 mxm_wmi rapl iTCO_wdt\nipmi_si iTCO_vendor_support mei_me ipmi_devintf mei intel_cstate ioatdma\nintel_uncore i2c_smbus joydev pcspkr lpc_ich ipmi_msghandler acpi_power_meter\nacpi_pad xfs libcrc32c sr_mod sd_mod cdrom t10_pi sg crct10dif_pclmul\ncrc32_pclmul crc32c_intel drm_kms_helper drm_shmem_helper ahci libahci\nghash_clmulni_intel igb drm libata dca i2c_algo_bit wmi fuse\n CPU: 52 PID: 2117247 Comm: modprobe Not tainted 6.5.0-rc1+ #1\n Hardware name: Intel Corporation S2600CWR/S2600CW, BIOS\nSE5C610.86B.01.01.0014.121820151719 12/18/2015\n RIP: 0010:ib_cq_pool_cleanup+0xac/0xb0 [ib_core]\n Code: ff 48 8b 43 40 48 8d 7b 40 48 83 e8 40 4c 39 e7 75 b3 49 83\nc4 10 4d 39 fc 75 94 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc \u003c0f\u003e 0b eb a1\n90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f\n RSP: 0018:ffffc10bea13fc80 EFLAGS: 00010206\n RAX: 000000000000010c RBX: ffff9bf5c7e66c00 RCX: 000000008020001d\n RDX: 000000008020001e RSI: fffff175221f9900 RDI: ffff9bf5c7e67640\n RBP: ffff9bf5c7e67600 R08: ffff9bf5c7e64400 R09: 000000008020001d\n R10: 0000000040000000 R11: 0000000000000000 R12: ffff9bee4b1e8a18\n R13: dead000000000122 R14: dead000000000100 R15: ffff9bee4b1e8a38\n FS:  00007ff1e6d38740(0000) GS:ffff9bfd9fb00000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00005652044ecc68 CR3: 0000000889b5c005 CR4: 00000000001706e0\n Call Trace:\n  \u003cTASK\u003e\n  ? __warn+0x80/0x130\n  ? ib_cq_pool_cleanup+0xac/0xb0 [ib_core]\n  ? report_bug+0x195/0x1a0\n  ? handle_bug+0x3c/0x70\n  ? exc_invalid_op+0x14/0x70\n  ? asm_exc_invalid_op+0x16/0x20\n  ? ib_cq_pool_cleanup+0xac/0xb0 [ib_core]\n  disable_device+0x9d/0x160 [ib_core]\n  __ib_unregister_device+0x42/0xb0 [ib_core]\n  ib_unregister_device+0x22/0x30 [ib_core]\n  rvt_unregister_device+0x20/0x90 [rdmavt]\n  hfi1_unregister_ib_device+0x16/0xf0 [hfi1]\n  remove_one+0x55/0x1a0 [hfi1]\n  pci_device_remove+0x36/0xa0\n  device_release_driver_internal+0x193/0x200\n  driver_detach+0x44/0x90\n  bus_remove_driver+0x69/0xf0\n  pci_unregister_driver+0x2a/0xb0\n  hfi1_mod_cleanup+0xc/0x3c [hfi1]\n  __do_sys_delete_module.constprop.0+0x17a/0x2f0\n  ? exit_to_user_mode_prepare+0xc4/0xd0\n  ? syscall_trace_enter.constprop.0+0x126/0x1a0\n  do_syscall_64+0x5c/0x90\n  ? syscall_exit_to_user_mode+0x12/0x30\n  ? do_syscall_64+0x69/0x90\n  ? syscall_exit_work+0x103/0x130\n  ? syscall_exit_to_user_mode+0x12/0x30\n  ? do_syscall_64+0x69/0x90\n  ? exc_page_fault+0x65/0x150\n  entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n RIP: 0033:0x7ff1e643f5ab\n Code: 73 01 c3 48 8b 0d 75 a8 1b 00 f7 d8 64 89 01 48 83 c8 ff c3\n66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 b0 00 00 00 0f 05 \u003c48\u003e 3d 01 f0\nff ff 73 01 c3 48 8b 0d 45 a8 1b 00 f7 d8 64 89 01 48\n RSP: 002b:00007ffec9103cc8 EFLAGS: 00000206 ORIG_RAX: 00000000000000b0\n RAX: ffffffffffffffda RBX: 00005615267fdc50 RCX: 00007ff1e643f5ab\n RDX: 0000000000000000 RSI: 0000000000000800 RDI: 00005615267fdcb8\n RBP: 00005615267fdc50 R08: 0000000000000000 R09: 0000000000000000\n R10: 00007ff1e659eac0 R11: 0000000000000206 R12: 00005615267fdcb8\n R13: 00000000000\n---truncated---"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-30T12:11:14.720Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/77e90bd53019d4d4c9e25552b5efb06dfd8c3c82"
        },
        {
          "url": "https://git.kernel.org/stable/c/a277b736309f923d9baff0ef166d694d348a5b96"
        },
        {
          "url": "https://git.kernel.org/stable/c/9b6296861a5a9d58aacd72c249a68b073c78bfb4"
        },
        {
          "url": "https://git.kernel.org/stable/c/aa950b9835f2d004b071fd220459edd3cd0a3603"
        },
        {
          "url": "https://git.kernel.org/stable/c/1bb42aca7a9611c1991a790834e2a65f3345c5e8"
        },
        {
          "url": "https://git.kernel.org/stable/c/3f39698e7e842abc9bd2bd97bf5eeda4543db758"
        },
        {
          "url": "https://git.kernel.org/stable/c/4082b59705ee9e3912eaa9e15abda8e76039b681"
        },
        {
          "url": "https://git.kernel.org/stable/c/a3189341e2f609d48f730b18c8bbbf6783233477"
        },
        {
          "url": "https://git.kernel.org/stable/c/dfe261107c080709459c32695847eec96238852b"
        }
      ],
      "title": "Revert \"IB/isert: Fix incorrect release of isert connection\"",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-54219",
    "datePublished": "2025-12-30T12:11:14.720Z",
    "dateReserved": "2025-12-30T12:06:44.501Z",
    "dateUpdated": "2025-12-30T12:11:14.720Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-54219\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-30T13:16:10.187\",\"lastModified\":\"2025-12-31T20:42:43.210\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nRevert \\\"IB/isert: Fix incorrect release of isert connection\\\"\\n\\nCommit: 699826f4e30a (\\\"IB/isert: Fix incorrect release of isert connection\\\") is\\ncausing problems on OPA when DEVICE_REMOVAL is happening.\\n\\n ------------[ cut here ]------------\\n WARNING: CPU: 52 PID: 2117247 at drivers/infiniband/core/cq.c:359\\nib_cq_pool_cleanup+0xac/0xb0 [ib_core]\\n Modules linked in: nfsd nfs_acl target_core_user uio tcm_fc libfc\\nscsi_transport_fc tcm_loop target_core_pscsi target_core_iblock target_core_file\\nrpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs\\nrfkill rpcrdma rdma_ucm ib_srpt sunrpc ib_isert iscsi_target_mod target_core_mod\\nopa_vnic ib_iser libiscsi ib_umad scsi_transport_iscsi rdma_cm ib_ipoib iw_cm\\nib_cm hfi1(-) rdmavt ib_uverbs intel_rapl_msr intel_rapl_common sb_edac ib_core\\nx86_pkg_temp_thermal intel_powerclamp coretemp i2c_i801 mxm_wmi rapl iTCO_wdt\\nipmi_si iTCO_vendor_support mei_me ipmi_devintf mei intel_cstate ioatdma\\nintel_uncore i2c_smbus joydev pcspkr lpc_ich ipmi_msghandler acpi_power_meter\\nacpi_pad xfs libcrc32c sr_mod sd_mod cdrom t10_pi sg crct10dif_pclmul\\ncrc32_pclmul crc32c_intel drm_kms_helper drm_shmem_helper ahci libahci\\nghash_clmulni_intel igb drm libata dca i2c_algo_bit wmi fuse\\n CPU: 52 PID: 2117247 Comm: modprobe Not tainted 6.5.0-rc1+ #1\\n Hardware name: Intel Corporation S2600CWR/S2600CW, BIOS\\nSE5C610.86B.01.01.0014.121820151719 12/18/2015\\n RIP: 0010:ib_cq_pool_cleanup+0xac/0xb0 [ib_core]\\n Code: ff 48 8b 43 40 48 8d 7b 40 48 83 e8 40 4c 39 e7 75 b3 49 83\\nc4 10 4d 39 fc 75 94 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc \u003c0f\u003e 0b eb a1\\n90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f\\n RSP: 0018:ffffc10bea13fc80 EFLAGS: 00010206\\n RAX: 000000000000010c RBX: ffff9bf5c7e66c00 RCX: 000000008020001d\\n RDX: 000000008020001e RSI: fffff175221f9900 RDI: ffff9bf5c7e67640\\n RBP: ffff9bf5c7e67600 R08: ffff9bf5c7e64400 R09: 000000008020001d\\n R10: 0000000040000000 R11: 0000000000000000 R12: ffff9bee4b1e8a18\\n R13: dead000000000122 R14: dead000000000100 R15: ffff9bee4b1e8a38\\n FS:  00007ff1e6d38740(0000) GS:ffff9bfd9fb00000(0000) knlGS:0000000000000000\\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\\n CR2: 00005652044ecc68 CR3: 0000000889b5c005 CR4: 00000000001706e0\\n Call Trace:\\n  \u003cTASK\u003e\\n  ? __warn+0x80/0x130\\n  ? ib_cq_pool_cleanup+0xac/0xb0 [ib_core]\\n  ? report_bug+0x195/0x1a0\\n  ? handle_bug+0x3c/0x70\\n  ? exc_invalid_op+0x14/0x70\\n  ? asm_exc_invalid_op+0x16/0x20\\n  ? ib_cq_pool_cleanup+0xac/0xb0 [ib_core]\\n  disable_device+0x9d/0x160 [ib_core]\\n  __ib_unregister_device+0x42/0xb0 [ib_core]\\n  ib_unregister_device+0x22/0x30 [ib_core]\\n  rvt_unregister_device+0x20/0x90 [rdmavt]\\n  hfi1_unregister_ib_device+0x16/0xf0 [hfi1]\\n  remove_one+0x55/0x1a0 [hfi1]\\n  pci_device_remove+0x36/0xa0\\n  device_release_driver_internal+0x193/0x200\\n  driver_detach+0x44/0x90\\n  bus_remove_driver+0x69/0xf0\\n  pci_unregister_driver+0x2a/0xb0\\n  hfi1_mod_cleanup+0xc/0x3c [hfi1]\\n  __do_sys_delete_module.constprop.0+0x17a/0x2f0\\n  ? exit_to_user_mode_prepare+0xc4/0xd0\\n  ? syscall_trace_enter.constprop.0+0x126/0x1a0\\n  do_syscall_64+0x5c/0x90\\n  ? syscall_exit_to_user_mode+0x12/0x30\\n  ? do_syscall_64+0x69/0x90\\n  ? syscall_exit_work+0x103/0x130\\n  ? syscall_exit_to_user_mode+0x12/0x30\\n  ? do_syscall_64+0x69/0x90\\n  ? exc_page_fault+0x65/0x150\\n  entry_SYSCALL_64_after_hwframe+0x6e/0xd8\\n RIP: 0033:0x7ff1e643f5ab\\n Code: 73 01 c3 48 8b 0d 75 a8 1b 00 f7 d8 64 89 01 48 83 c8 ff c3\\n66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 b0 00 00 00 0f 05 \u003c48\u003e 3d 01 f0\\nff ff 73 01 c3 48 8b 0d 45 a8 1b 00 f7 d8 64 89 01 48\\n RSP: 002b:00007ffec9103cc8 EFLAGS: 00000206 ORIG_RAX: 00000000000000b0\\n RAX: ffffffffffffffda RBX: 00005615267fdc50 RCX: 00007ff1e643f5ab\\n RDX: 0000000000000000 RSI: 0000000000000800 RDI: 00005615267fdcb8\\n RBP: 00005615267fdc50 R08: 0000000000000000 R09: 0000000000000000\\n R10: 00007ff1e659eac0 R11: 0000000000000206 R12: 00005615267fdcb8\\n R13: 00000000000\\n---truncated---\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1bb42aca7a9611c1991a790834e2a65f3345c5e8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3f39698e7e842abc9bd2bd97bf5eeda4543db758\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/4082b59705ee9e3912eaa9e15abda8e76039b681\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/77e90bd53019d4d4c9e25552b5efb06dfd8c3c82\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9b6296861a5a9d58aacd72c249a68b073c78bfb4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a277b736309f923d9baff0ef166d694d348a5b96\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a3189341e2f609d48f730b18c8bbbf6783233477\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/aa950b9835f2d004b071fd220459edd3cd0a3603\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/dfe261107c080709459c32695847eec96238852b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…