cve-2023-52519
Vulnerability from cvelistv5
Published
2024-03-02 21:52
Modified
2024-11-04 14:48
Severity ?
Summary
HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit
Impacted products
LinuxLinux
LinuxLinux
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-52519",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-21T16:13:47.131196Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-21T16:13:54.680Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T23:03:20.629Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/8781fe259dd5a178fdd1069401bbd1437f9491c5"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/cdcc04e844a2d22d9d25cef1e8e504a174ea9f8f"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/60fb3f054c99608ddb1f2466c07108da6292951e"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/8f02139ad9a7e6e5c05712f8c1501eebed8eacfd"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/hid/intel-ish-hid/ipc/pci-ish.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "8781fe259dd5",
              "status": "affected",
              "version": "2e23a70edabe",
              "versionType": "git"
            },
            {
              "lessThan": "cdcc04e844a2",
              "status": "affected",
              "version": "2e23a70edabe",
              "versionType": "git"
            },
            {
              "lessThan": "60fb3f054c99",
              "status": "affected",
              "version": "2e23a70edabe",
              "versionType": "git"
            },
            {
              "lessThan": "8f02139ad9a7",
              "status": "affected",
              "version": "2e23a70edabe",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/hid/intel-ish-hid/ipc/pci-ish.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.12"
            },
            {
              "lessThan": "5.12",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.135",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.57",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.5.*",
              "status": "unaffected",
              "version": "6.5.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.6",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit\n\nThe EHL (Elkhart Lake) based platforms provide a OOB (Out of band)\nservice, which allows to wakup device when the system is in S5 (Soft-Off\nstate). This OOB service can be enabled/disabled from BIOS settings. When\nenabled, the ISH device gets PME wake capability. To enable PME wakeup,\ndriver also needs to enable ACPI GPE bit.\n\nOn resume, BIOS will clear the wakeup bit. So driver need to re-enable it\nin resume function to keep the next wakeup capability. But this BIOS\nclearing of wakeup bit doesn\u0027t decrement internal OS GPE reference count,\nso this reenabling on every resume will cause reference count to overflow.\n\nSo first disable and reenable ACPI GPE bit using acpi_disable_gpe()."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-04T14:48:27.175Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/8781fe259dd5a178fdd1069401bbd1437f9491c5"
        },
        {
          "url": "https://git.kernel.org/stable/c/cdcc04e844a2d22d9d25cef1e8e504a174ea9f8f"
        },
        {
          "url": "https://git.kernel.org/stable/c/60fb3f054c99608ddb1f2466c07108da6292951e"
        },
        {
          "url": "https://git.kernel.org/stable/c/8f02139ad9a7e6e5c05712f8c1501eebed8eacfd"
        }
      ],
      "title": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit",
      "x_generator": {
        "engine": "bippy-9e1c9544281a"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-52519",
    "datePublished": "2024-03-02T21:52:27.816Z",
    "dateReserved": "2024-02-20T12:30:33.317Z",
    "dateUpdated": "2024-11-04T14:48:27.175Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-52519\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-03-02T22:15:48.027\",\"lastModified\":\"2024-03-04T13:58:23.447\",\"vulnStatus\":\"Awaiting Analysis\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nHID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit\\n\\nThe EHL (Elkhart Lake) based platforms provide a OOB (Out of band)\\nservice, which allows to wakup device when the system is in S5 (Soft-Off\\nstate). This OOB service can be enabled/disabled from BIOS settings. When\\nenabled, the ISH device gets PME wake capability. To enable PME wakeup,\\ndriver also needs to enable ACPI GPE bit.\\n\\nOn resume, BIOS will clear the wakeup bit. So driver need to re-enable it\\nin resume function to keep the next wakeup capability. But this BIOS\\nclearing of wakeup bit doesn\u0027t decrement internal OS GPE reference count,\\nso this reenabling on every resume will cause reference count to overflow.\\n\\nSo first disable and reenable ACPI GPE bit using acpi_disable_gpe().\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: HID: intel-ish-hid: ipc: Deshabilita y vuelve a habilitar el bit ACPI GPE Las plataformas basadas en EHL (Elkhart Lake) proporcionan un servicio OOB (Fuera de banda), que permite despertar dispositivo cuando el sistema est\u00e1 en S5 (estado Soft-Off). Este servicio OOB se puede habilitar/deshabilitar desde la configuraci\u00f3n del BIOS. Cuando est\u00e1 habilitado, el dispositivo ISH obtiene la capacidad de activaci\u00f3n PME. Para habilitar la activaci\u00f3n de PME, el controlador tambi\u00e9n debe habilitar el bit ACPI GPE. Al reanudar, el BIOS borrar\u00e1 el bit de activaci\u00f3n. Por lo tanto, el controlador debe volver a habilitarlo en la funci\u00f3n de reanudaci\u00f3n para mantener la siguiente capacidad de activaci\u00f3n. Pero esta limpieza del bit de activaci\u00f3n del BIOS no disminuye el recuento de referencias GPE del sistema operativo interno, por lo que esta reactivaci\u00f3n en cada reanudaci\u00f3n provocar\u00e1 que el recuento de referencias se desborde. Entonces, primero deshabilite y vuelva a habilitar el bit ACPI GPE usando acpi_disable_gpe().\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/60fb3f054c99608ddb1f2466c07108da6292951e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8781fe259dd5a178fdd1069401bbd1437f9491c5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8f02139ad9a7e6e5c05712f8c1501eebed8eacfd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cdcc04e844a2d22d9d25cef1e8e504a174ea9f8f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.