Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2023-53532

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
01/10/2025
Última modificación:
02/10/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: ath11k: fix deinitialization of firmware resources<br /> <br /> Currently, in ath11k_ahb_fw_resources_init(), iommu domain<br /> mapping is done only for the chipsets having fixed firmware<br /> memory. Also, for such chipsets, mapping is done only if it<br /> does not have TrustZone support.<br /> <br /> During deinitialization, only if TrustZone support is not there,<br /> iommu is unmapped back. However, for non fixed firmware memory<br /> chipsets, TrustZone support is not there and this makes the<br /> condition check to true and it tries to unmap the memory which<br /> was not mapped during initialization.<br /> <br /> This leads to the following trace -<br /> <br /> [ 83.198790] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008<br /> [ 83.259537] Modules linked in: ath11k_ahb ath11k qmi_helpers<br /> .. snip ..<br /> [ 83.280286] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br /> [ 83.287228] pc : __iommu_unmap+0x30/0x140<br /> [ 83.293907] lr : iommu_unmap+0x5c/0xa4<br /> [ 83.298072] sp : ffff80000b3abad0<br /> .. snip ..<br /> [ 83.369175] Call trace:<br /> [ 83.376282] __iommu_unmap+0x30/0x140<br /> [ 83.378541] iommu_unmap+0x5c/0xa4<br /> [ 83.382360] ath11k_ahb_fw_resource_deinit.part.12+0x2c/0xac [ath11k_ahb]<br /> [ 83.385666] ath11k_ahb_free_resources+0x140/0x17c [ath11k_ahb]<br /> [ 83.392521] ath11k_ahb_shutdown+0x34/0x40 [ath11k_ahb]<br /> [ 83.398248] platform_shutdown+0x20/0x2c<br /> [ 83.403455] device_shutdown+0x16c/0x1c4<br /> [ 83.407621] kernel_restart_prepare+0x34/0x3c<br /> [ 83.411529] kernel_restart+0x14/0x74<br /> [ 83.415781] __do_sys_reboot+0x1c4/0x22c<br /> [ 83.419427] __arm64_sys_reboot+0x1c/0x24<br /> [ 83.423420] invoke_syscall+0x44/0xfc<br /> [ 83.427326] el0_svc_common.constprop.3+0xac/0xe8<br /> [ 83.430974] do_el0_svc+0xa0/0xa8<br /> [ 83.435659] el0_svc+0x1c/0x44<br /> [ 83.438957] el0t_64_sync_handler+0x60/0x144<br /> [ 83.441910] el0t_64_sync+0x15c/0x160<br /> [ 83.446343] Code: aa0103f4 f9400001 f90027a1 d2800001 (f94006a0)<br /> [ 83.449903] ---[ end trace 0000000000000000 ]---<br /> <br /> This can be reproduced by probing an AHB chipset which is not<br /> having a fixed memory region. During reboot (or rmmod) trace<br /> can be seen.<br /> <br /> Fix this issue by adding a condition check on firmware fixed memory<br /> hw_param as done in the counter initialization function.<br /> <br /> Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1

Impacto