CVE-2023-52849
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
21/05/2024
Last modified:
30/12/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
cxl/mem: Fix shutdown order<br />
<br />
Ira reports that removing cxl_mock_mem causes a crash with the following<br />
trace:<br />
<br />
BUG: kernel NULL pointer dereference, address: 0000000000000044<br />
[..]<br />
RIP: 0010:cxl_region_decode_reset+0x7f/0x180 [cxl_core]<br />
[..]<br />
Call Trace:<br />
<br />
cxl_region_detach+0xe8/0x210 [cxl_core]<br />
cxl_decoder_kill_region+0x27/0x40 [cxl_core]<br />
cxld_unregister+0x29/0x40 [cxl_core]<br />
devres_release_all+0xb8/0x110<br />
device_unbind_cleanup+0xe/0x70<br />
device_release_driver_internal+0x1d2/0x210<br />
bus_remove_device+0xd7/0x150<br />
device_del+0x155/0x3e0<br />
device_unregister+0x13/0x60<br />
devm_release_action+0x4d/0x90<br />
? __pfx_unregister_port+0x10/0x10 [cxl_core]<br />
delete_endpoint+0x121/0x130 [cxl_core]<br />
devres_release_all+0xb8/0x110<br />
device_unbind_cleanup+0xe/0x70<br />
device_release_driver_internal+0x1d2/0x210<br />
bus_remove_device+0xd7/0x150<br />
device_del+0x155/0x3e0<br />
? lock_release+0x142/0x290<br />
cdev_device_del+0x15/0x50<br />
cxl_memdev_unregister+0x54/0x70 [cxl_core]<br />
<br />
This crash is due to the clearing out the cxl_memdev&#39;s driver context<br />
(@cxlds) before the subsystem is done with it. This is ultimately due to<br />
the region(s), that this memdev is a member, being torn down and expecting<br />
to be able to de-reference @cxlds, like here:<br />
<br />
static int cxl_region_decode_reset(struct cxl_region *cxlr, int count)<br />
...<br />
if (cxlds->rcd)<br />
goto endpoint_reset;<br />
...<br />
<br />
Fix it by keeping the driver context valid until memdev-device<br />
unregistration, and subsequently the entire stack of related<br />
dependencies, unwinds.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.14.8 (including) | 5.15.139 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.63 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.5.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6 (including) | 6.6.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0ca074f7d788627a4e0b047ca5fbdb5fc567220c
- https://git.kernel.org/stable/c/20bd0198bebdd706bd4614b3933ef70d7c19618f
- https://git.kernel.org/stable/c/7c7371b41a14e86f53e7dbe5baa7b1d3e0ab324b
- https://git.kernel.org/stable/c/88d3917f82ed4215a2154432c26de1480a61b209
- https://git.kernel.org/stable/c/cad22a757029c3a1985c221a2d4a6491ad4035ae
- https://git.kernel.org/stable/c/0ca074f7d788627a4e0b047ca5fbdb5fc567220c
- https://git.kernel.org/stable/c/20bd0198bebdd706bd4614b3933ef70d7c19618f
- https://git.kernel.org/stable/c/7c7371b41a14e86f53e7dbe5baa7b1d3e0ab324b
- https://git.kernel.org/stable/c/88d3917f82ed4215a2154432c26de1480a61b209
- https://git.kernel.org/stable/c/cad22a757029c3a1985c221a2d4a6491ad4035ae



