CVE-2023-52474

Source
https://cve.org/CVERecord?id=CVE-2023-52474
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52474.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52474
Downstream
Related
Published
2024-02-26T17:20:22.790Z
Modified
2026-04-02T09:42:52.238026Z
Summary
IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests
Details

In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests

hfi1 user SDMA request processing has two bugs that can cause data corruption for user SDMA requests that have multiple payload iovecs where an iovec other than the tail iovec does not run up to the page boundary for the buffer pointed to by that iovec.a

Here are the specific bugs: 1. usersdmatxadd() does not use struct usersdmaiovec->iov.iovlen. Rather, usersdmatxadd() will add up to PAGESIZE bytes from iovec to the packet, even if some of those bytes are past iovec->iov.iovlen and are thus not intended to be in the packet. 2. usersdmatxadd() and usersdmasendpkts() fail to advance to the next iovec in usersdmarequest->iovs when the current iovec is not PAGE_SIZE and does not contain enough data to complete the packet. The transmitted packet will contain the wrong data from the iovec pages.

This has not been an issue with SDMA packets from hfi1 Verbs or PSM2 because they only produce iovecs that end short of PAGE_SIZE as the tail iovec of an SDMA request.

Fixing these bugs exposes other bugs with the SDMA pin cache (struct mmurbhandler) that get in way of supporting user SDMA requests with multiple payload iovecs whose buffers do not end at PAGE_SIZE. So this commit fixes those issues as well.

Here are the mmurbhandler bugs that non-PAGESIZE-end multi-iovec payload user SDMA requests can hit: 1. Overlapping memory ranges in mmurbhandler will result in duplicate pinnings. 2. When extending an existing mmurbhandler entry (struct mmurbnode), the mmurb code (1) removes the existing entry under a lock, (2) releases that lock, pins the new pages, (3) then reacquires the lock to insert the extended mmurbnode.

If someone else comes in and inserts an overlapping entry between (2) and (3), insert in (3) will fail.

The failure path code in this case unpins all pages in either the original mmurbnode or the new mmurbnode that was inserted between (2) and (3). 3. In hfi1mmurbremoveunlessexact(), mmurbnode->refcount is incremented outside of mmurbhandler->lock. As a result, mmurbnode could be evicted by another thread that gets mmurbhandler->lock and checks mmurbnode->refcount before mmurbnode->refcount is incremented. 4. Related to #2 above, SDMA request submission failure path does not check mmurbnode->refcount before freeing mmurb_node object.

If there are other SDMA requests in progress whose iovecs have pointers to the now-freed mmurbnode(s), those pointers to the now-freed mmu_rb nodes will be dereferenced when those SDMA requests complete.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52474.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7724105686e718ac476a6ad3304fea2fbcfcffde
Fixed
9c4c6512d7330b743c4ffd18bd999a86ca26db0d
Fixed
a2bd706ab63509793b5cd5065e685b7ef5cba678
Fixed
dce59b5443700fbd0d2433ec6e4d4cf063448844
Fixed
c76cb8f4bdf26d04cfa5485a93ce297dba5e6a80
Fixed
7e6010f79b58f45b204cf18aa58f4b73c3f30adc
Fixed
00cbce5cbf88459cd1aa1d60d0f1df15477df127

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52474.json"