-

CVE-2023-53446

In the Linux kernel, the following vulnerability has been resolved:

PCI/ASPM: Disable ASPM on MFD function removal to avoid use-after-free

Struct pcie_link_state->downstream is a pointer to the pci_dev of function
0.  Previously we retained that pointer when removing function 0, and
subsequent ASPM policy changes dereferenced it, resulting in a
use-after-free warning from KASAN, e.g.:

  # echo 1 > /sys/bus/pci/devices/0000:03:00.0/remove
  # echo powersave > /sys/module/pcie_aspm/parameters/policy

  BUG: KASAN: slab-use-after-free in pcie_config_aspm_link+0x42d/0x500
  Call Trace:
   kasan_report+0xae/0xe0
   pcie_config_aspm_link+0x42d/0x500
   pcie_aspm_set_policy+0x8e/0x1a0
   param_attr_store+0x162/0x2c0
   module_attr_store+0x3e/0x80

PCIe spec r6.0, sec 7.5.3.7, recommends that software program the same ASPM
Control value in all functions of multi-function devices.

Disable ASPM and free the pcie_link_state when any child function is
removed so we can discard the dangling pcie_link_state->downstream pointer
and maintain the same ASPM Control configuration for all functions.

[bhelgaas: commit log and comment]

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 666e7f9d60cee23077ea3e6331f6f8a19f7ea03f
Version b5a0a9b59c8185aebcd9a717e2e6258b58c72c06
Status affected
Version < 7badf4d6f49a358a01ab072bbff88d3ee886c33b
Version b5a0a9b59c8185aebcd9a717e2e6258b58c72c06
Status affected
Version < 9856c0de49052174ab474113f4ba40c02aaee086
Version b5a0a9b59c8185aebcd9a717e2e6258b58c72c06
Status affected
Version < 7aecdd47910c51707696e8b0e045b9f88bd4230f
Version b5a0a9b59c8185aebcd9a717e2e6258b58c72c06
Status affected
Version < d51d2eeae4ce54d542909c4d9d07bf371a78592c
Version b5a0a9b59c8185aebcd9a717e2e6258b58c72c06
Status affected
Version < 4203722d51afe3d239e03f15cc73efdf023a7103
Version b5a0a9b59c8185aebcd9a717e2e6258b58c72c06
Status affected
Version < 456d8aa37d0f56fc9e985e812496e861dcd6f2f2
Version b5a0a9b59c8185aebcd9a717e2e6258b58c72c06
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.11
Status affected
Version < 4.11
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.251
Status unaffected
Version <= 5.10.*
Version 5.10.188
Status unaffected
Version <= 5.15.*
Version 5.15.121
Status unaffected
Version <= 6.1.*
Version 6.1.39
Status unaffected
Version <= 6.3.*
Version 6.3.13
Status unaffected
Version <= 6.4.*
Version 6.4.4
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.125
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String