In the Linux kernel, the following vulnerability has been resolved: PCI:
switchtec: Fix stdev_release() crash after surprise hot remove A PCI device
hot removal may occur while stdev->cdev is held open. The call to
stdev_release() then happens during close or exit, at a point way past
switchtec_pci_remove(). Otherwise the last ref would vanish with the
trailing put_device(), just before return. At that later point in time, the
devm cleanup has already removed the stdev->mmio_mrpc mapping. Also, the
stdev->pdev reference was not a counted one. Therefore, in DMA mode, the
iowrite32() in stdev_release() will cause a fatal page fault, and the
subsequent dma_free_coherent(), if reached, would pass a stale
&stdev->pdev->dev pointer. Fix by moving MRPC DMA shutdown into
switchtec_pci_remove(), after stdev_kill(). Counting the stdev->pdev ref is
now optional, but may prevent future accidents. Reproducible via the script
at https://lore.kernel.org/r/[email protected]
Author | Note |
---|---|
rodrigo-zaiden | USN-6765-1 for linux-oem-6.5 wrongly stated that this CVE was fixed in version 6.5.0-1022.23. The mentioned notice was revoked and the state of the fix for linux-oem-6.5 was recovered to the previous state. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < 5.4.0-181.201 | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-106.116 | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < 6.5.0-41.41 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1124.134 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1061.67 | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < 6.5.0-1021.21 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1061.67~20.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < 5.4.0-1124.134~18.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < 5.4.0-1129.136 | UNKNOWN |
git.kernel.org/linus/df25461119d987b8c81d232cfe4411e91dcabe66 (6.8-rc1)
git.kernel.org/stable/c/0233b836312e39a3c763fb53512b3fa455b473b3
git.kernel.org/stable/c/1d83c85922647758c1f1e4806a4c5c3cf591a20a
git.kernel.org/stable/c/4a5d0528cf19dbf060313dffbe047bc11c90c24c
git.kernel.org/stable/c/d8c293549946ee5078ed0ab77793cec365559355
git.kernel.org/stable/c/df25461119d987b8c81d232cfe4411e91dcabe66
git.kernel.org/stable/c/e129c7fa7070fbce57feb0bfc5eaa65eef44b693
git.kernel.org/stable/c/ff1c7e2fb9e9c3f53715fbe04d3ac47b80be7eb8
launchpad.net/bugs/cve/CVE-2023-52617
nvd.nist.gov/vuln/detail/CVE-2023-52617
security-tracker.debian.org/tracker/CVE-2023-52617
ubuntu.com/security/notices/USN-6766-1
ubuntu.com/security/notices/USN-6766-2
ubuntu.com/security/notices/USN-6766-3
ubuntu.com/security/notices/USN-6767-1
ubuntu.com/security/notices/USN-6767-2
ubuntu.com/security/notices/USN-6795-1
ubuntu.com/security/notices/USN-6818-1
ubuntu.com/security/notices/USN-6818-2
ubuntu.com/security/notices/USN-6818-3
ubuntu.com/security/notices/USN-6818-4
ubuntu.com/security/notices/USN-6819-1
ubuntu.com/security/notices/USN-6819-2
ubuntu.com/security/notices/USN-6819-3
ubuntu.com/security/notices/USN-6819-4
ubuntu.com/security/notices/USN-6828-1
www.cve.org/CVERecord?id=CVE-2023-52617