Bug 2180936 (CVE-2023-1582)

Summary: CVE-2023-1582 kernel: Soft lockup occurred during __page_mapcount
Product: [Other] Security Response Reporter: Rohit Keshri <rkeshri>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: acaringi, allarkin, bhu, chwhite, crwood, dbohanno, ddepaula, debarbos, dfreiber, dvlasenk, ezulian, hkrzesin, jarod, jburrell, jdenham, jfaracco, jferlan, jforbes, jlelli, joe.lawrence, jshortt, jstancek, jwyatt, kcarcia, kernel-mgr, ldoskova, lgoncalv, lleshchi, lmlikith, lzampier, nmurray, ptalbert, qzhao, rogbas, rrobaina, rvrbovsk, rysulliv, scweaver, tyberry, vkumar, walters, wcosta, williams, wmealing, ycote
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Kernel 5.7 RC14 Doc Type: If docs needed, set a value
Doc Text:
A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-05-16 23:42:21 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2180958, 2180991, 2180992    
Bug Blocks: 2174623, 2176389    

Description Rohit Keshri 2023-03-22 16:58:10 UTC
A race problem was found fs/proc/task_mmu.c leading to a denial of service problem. 

Crash:
    [  160.464398] Call Trace:
    [  160.466452]  smaps_account+0xb6/0x220
    [  160.469256]  smaps_pte_range+0x49c/0x610
    [  160.472215]  walk_pgd_range+0x471/0xa30
    [  160.475196]  ? apic_timer_interrupt+0xa/0x20
    [  160.478362]  __walk_page_range+0x57/0x180
    [  160.481424]  walk_page_vma+0x66/0x90
    [  160.484174]  smap_gather_stats+0x42/0xa

Reference:
https://lore.kernel.org/linux-mm/Yg6ac8WlwtnDH6M0@kroah.com/

Comment 7 errata-xmlrpc 2023-05-16 08:06:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2736 https://access.redhat.com/errata/RHSA-2023:2736

Comment 8 errata-xmlrpc 2023-05-16 08:35:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2951 https://access.redhat.com/errata/RHSA-2023:2951

Comment 9 Product Security DevOps Team 2023-05-16 23:42:17 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-1582