We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-53123

PCI: s390: Fix use-after-free of PCI resources with per-function hotplug



Description

In the Linux kernel, the following vulnerability has been resolved: PCI: s390: Fix use-after-free of PCI resources with per-function hotplug On s390 PCI functions may be hotplugged individually even when they belong to a multi-function device. In particular on an SR-IOV device VFs may be removed and later re-added. In commit a50297cf8235 ("s390/pci: separate zbus creation from scanning") it was missed however that struct pci_bus and struct zpci_bus's resource list retained a reference to the PCI functions MMIO resources even though those resources are released and freed on hot-unplug. These stale resources may subsequently be claimed when the PCI function re-appears resulting in use-after-free. One idea of fixing this use-after-free in s390 specific code that was investigated was to simply keep resources around from the moment a PCI function first appeared until the whole virtual PCI bus created for a multi-function device disappears. The problem with this however is that due to the requirement of artificial MMIO addreesses (address cookies) extra logic is then needed to keep the address cookies compatible on re-plug. At the same time the MMIO resources semantically belong to the PCI function so tying their lifecycle to the function seems more logical. Instead a simpler approach is to remove the resources of an individually hot-unplugged PCI function from the PCI bus's resource list while keeping the resources of other PCI functions on the PCI bus untouched. This is done by introducing pci_bus_remove_resource() to remove an individual resource. Similarly the resource also needs to be removed from the struct zpci_bus's resource list. It turns out however, that there is really no need to add the MMIO resources to the struct zpci_bus's resource list at all and instead we can simply use the zpci_bar_struct's resource pointer directly.

Reserved 2025-05-02 | Published 2025-05-02 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

a50297cf8235b062bcdeaa8b1dad58e69d3e1b43 before 437bb839e36cc9f35adc6d2a2bf113b7a0fc9985
affected

a50297cf8235b062bcdeaa8b1dad58e69d3e1b43 before a2410d0c3d2d714ed968a135dfcbed6aa3ff7027
affected

a50297cf8235b062bcdeaa8b1dad58e69d3e1b43 before b99ebf4b62774e690e73a551cf5fbf6f219bdd96
affected

a50297cf8235b062bcdeaa8b1dad58e69d3e1b43 before ab909509850b27fd39b8ba99e44cda39dbc3858c
affected

Default status
affected

5.13
affected

Any version before 5.13
unaffected

5.15.104
unaffected

6.1.21
unaffected

6.2.8
unaffected

6.3
unaffected

References

git.kernel.org/...c/437bb839e36cc9f35adc6d2a2bf113b7a0fc9985

git.kernel.org/...c/a2410d0c3d2d714ed968a135dfcbed6aa3ff7027

git.kernel.org/...c/b99ebf4b62774e690e73a551cf5fbf6f219bdd96

git.kernel.org/...c/ab909509850b27fd39b8ba99e44cda39dbc3858c

cve.org (CVE-2023-53123)

nvd.nist.gov (CVE-2023-53123)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-53123

Support options

Helpdesk Chat, Email, Knowledgebase