{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T18:37:45.255","vulnerabilities":[{"cve":{"id":"CVE-2023-52632","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2024-04-02T07:15:41.010","lastModified":"2025-03-17T15:17:57.207","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm\/amdkfd: Fix lock dependency warning with srcu\n\n======================================================\nWARNING: possible circular locking dependency detected\n6.5.0-kfd-yangp #2289 Not tainted\n------------------------------------------------------\nkworker\/0:2\/996 is trying to acquire lock:\n        (srcu){.+.+}-{0:0}, at: __synchronize_srcu+0x5\/0x1a0\n\nbut task is already holding lock:\n        ((work_completion)(&svms->deferred_list_work)){+.+.}-{0:0}, at:\n\tprocess_one_work+0x211\/0x560\n\nwhich lock already depends on the new lock.\n\nthe existing dependency chain (in reverse order) is:\n\n-> #3 ((work_completion)(&svms->deferred_list_work)){+.+.}-{0:0}:\n        __flush_work+0x88\/0x4f0\n        svm_range_list_lock_and_flush_work+0x3d\/0x110 [amdgpu]\n        svm_range_set_attr+0xd6\/0x14c0 [amdgpu]\n        kfd_ioctl+0x1d1\/0x630 [amdgpu]\n        __x64_sys_ioctl+0x88\/0xc0\n\n-> #2 (&info->lock#2){+.+.}-{3:3}:\n        __mutex_lock+0x99\/0xc70\n        amdgpu_amdkfd_gpuvm_restore_process_bos+0x54\/0x740 [amdgpu]\n        restore_process_helper+0x22\/0x80 [amdgpu]\n        restore_process_worker+0x2d\/0xa0 [amdgpu]\n        process_one_work+0x29b\/0x560\n        worker_thread+0x3d\/0x3d0\n\n-> #1 ((work_completion)(&(&process->restore_work)->work)){+.+.}-{0:0}:\n        __flush_work+0x88\/0x4f0\n        __cancel_work_timer+0x12c\/0x1c0\n        kfd_process_notifier_release_internal+0x37\/0x1f0 [amdgpu]\n        __mmu_notifier_release+0xad\/0x240\n        exit_mmap+0x6a\/0x3a0\n        mmput+0x6a\/0x120\n        do_exit+0x322\/0xb90\n        do_group_exit+0x37\/0xa0\n        __x64_sys_exit_group+0x18\/0x20\n        do_syscall_64+0x38\/0x80\n\n-> #0 (srcu){.+.+}-{0:0}:\n        __lock_acquire+0x1521\/0x2510\n        lock_sync+0x5f\/0x90\n        __synchronize_srcu+0x4f\/0x1a0\n        __mmu_notifier_release+0x128\/0x240\n        exit_mmap+0x6a\/0x3a0\n        mmput+0x6a\/0x120\n        svm_range_deferred_list_work+0x19f\/0x350 [amdgpu]\n        process_one_work+0x29b\/0x560\n        worker_thread+0x3d\/0x3d0\n\nother info that might help us debug this:\nChain exists of:\n  srcu --> &info->lock#2 --> (work_completion)(&svms->deferred_list_work)\n\nPossible unsafe locking scenario:\n\n        CPU0                    CPU1\n        ----                    ----\n        lock((work_completion)(&svms->deferred_list_work));\n                        lock(&info->lock#2);\n\t\t\tlock((work_completion)(&svms->deferred_list_work));\n        sync(srcu);"},{"lang":"es","value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm\/amdkfd: corrige la advertencia de dependencia de bloqueo con srcu ============================== ========================== ADVERTENCIA: posible dependencia de bloqueo circular detectada 6.5.0-kfd-yangp #2289 No contaminado ------ ------------------------------------------------ ktrabajador\/ 0:2\/996 está intentando adquirir el bloqueo: (srcu){.+.+}-{0:0}, en: __synchronize_srcu+0x5\/0x1a0 pero la tarea ya mantiene el bloqueo: ((work_completion)(&amp;svms-&gt;deferred_list_work )){+.+.}-{0:0}, en: Process_one_work+0x211\/0x560 cuyo bloqueo ya depende del nuevo bloqueo. la cadena de dependencia existente (en orden inverso) es: -&gt; #3 ((work_completion)(&amp;svms-&gt;deferred_list_work)){+.+.}-{0:0}: __flush_work+0x88\/0x4f0 svm_range_list_lock_and_flush_work+0x3d\/0x110 [ amdgpu] svm_range_set_attr+0xd6\/0x14c0 [amdgpu] kfd_ioctl+0x1d1\/0x630 [amdgpu] __x64_sys_ioctl+0x88\/0xc0 -&gt; #2 (&amp;info-&gt;lock#2){+.+.}-{3:3}: __mutex_lock+ 0x99\/0xc70 amdgpu_amdkfd_gpuvm_restore_process_bos+0x54\/0x740 [amdgpu] restaurar_proceso_helper+0x22\/0x80 [amdgpu] restaurar_proceso_trabajador+0x2d\/0xa0 [amdgpu] proceso_one_work+0x29b\/0x560 trabajador_thread+0x3d\/0x3d 0 -&gt; #1 ((finalización_trabajo)(&amp;(&amp;proceso- &gt;restore_work)-&gt;work)){+.+.}-{0:0}: __flush_work+0x88\/0x4f0 __cancel_work_timer+0x12c\/0x1c0 kfd_process_notifier_release_internal+0x37\/0x1f0 [amdgpu] __mmu_notifier_release+0xad\/0x240 exit_mmap+0x6a\/0x3 a0 mmentrada +0x6a\/0x120 do_exit+0x322\/0xb90 do_group_exit+0x37\/0xa0 __x64_sys_exit_group+0x18\/0x20 do_syscall_64+0x38\/0x80 -&gt; #0 (srcu){.+.+}-{0:0}: __lock_acquire+0x1521\/0x2 510 lock_sync +0x5f\/0x90 __synchronize_srcu+0x4f\/0x1a0 __mmu_notifier_release+0x128\/0x240 exit_mmap+0x6a\/0x3a0 mmput+0x6a\/0x120 svm_range_deferred_list_work+0x19f\/0x350 [amdgpu] Process_one_work+0x29b\/0 x560 trabajador_thread+0x3d\/0x3d0 otra información que podría ayudarnos a depurar esto : Existe cadena de: srcu --&gt; &amp;info-&gt;lock#2 --&gt; (work_completion)(&amp;svms-&gt;deferred_list_work) Posible escenario de bloqueo inseguro: CPU0 CPU1 ---- ---- lock((work_completion)(&amp;svms- &gt;lista_trabajo_diferido)); bloquear(&amp;info-&gt;bloquear#2); lock((work_completion)(&amp;svms-&gt;deferred_list_work)); sincronización(srcu);"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-667"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.1.77","matchCriteriaId":"F749AC21-58DA-44BE-B3C5-7C53F294A67A"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2","versionEndExcluding":"6.6.16","matchCriteriaId":"A5007D6A-4B58-423A-8A3A-A1A656A263C8"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7","versionEndExcluding":"6.7.4","matchCriteriaId":"848BC44C-9D25-4557-A50A-4B8BF310FA78"}]}]}],"references":[{"url":"https:\/\/git.kernel.org\/stable\/c\/1556c242e64cdffe58736aa650b0b395854fe4d4","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https:\/\/git.kernel.org\/stable\/c\/2a9de42e8d3c82c6990d226198602be44f43f340","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https:\/\/git.kernel.org\/stable\/c\/752312f6a79440086ac0f9b08d7776870037323c","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https:\/\/git.kernel.org\/stable\/c\/b602f098f716723fa5c6c96a486e0afba83b7b94","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https:\/\/git.kernel.org\/stable\/c\/1556c242e64cdffe58736aa650b0b395854fe4d4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https:\/\/git.kernel.org\/stable\/c\/2a9de42e8d3c82c6990d226198602be44f43f340","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https:\/\/git.kernel.org\/stable\/c\/752312f6a79440086ac0f9b08d7776870037323c","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https:\/\/git.kernel.org\/stable\/c\/b602f098f716723fa5c6c96a486e0afba83b7b94","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}