cve-2024-43876
Vulnerability from cvelistv5
Published
2024-08-21 00:06
Modified
2024-11-05 09:41
Severity ?
Summary
PCI: rcar: Demote WARN() to dev_warn_ratelimited() in rcar_pcie_wakeup()
Impacted products
Vendor Product Version
Linux Linux Version: 5.18
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-43876",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T16:06:03.924258Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-12T17:33:17.886Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/pci/controller/pcie-rcar-host.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "2ae4769332df",
              "status": "affected",
              "version": "84b576146294",
              "versionType": "git"
            },
            {
              "lessThan": "526a877c6273",
              "status": "affected",
              "version": "84b576146294",
              "versionType": "git"
            },
            {
              "lessThan": "3ff3bdde950f",
              "status": "affected",
              "version": "84b576146294",
              "versionType": "git"
            },
            {
              "lessThan": "c93637e6a4c4",
              "status": "affected",
              "version": "84b576146294",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/pci/controller/pcie-rcar-host.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.18"
            },
            {
              "lessThan": "5.18",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.103",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.44",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.10.*",
              "status": "unaffected",
              "version": "6.10.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.11",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: rcar: Demote WARN() to dev_warn_ratelimited() in rcar_pcie_wakeup()\n\nAvoid large backtrace, it is sufficient to warn the user that there has\nbeen a link problem. Either the link has failed and the system is in need\nof maintenance, or the link continues to work and user has been informed.\nThe message from the warning can be looked up in the sources.\n\nThis makes an actual link issue less verbose.\n\nFirst of all, this controller has a limitation in that the controller\ndriver has to assist the hardware with transition to L1 link state by\nwriting L1IATN to PMCTRL register, the L1 and L0 link state switching\nis not fully automatic on this controller.\n\nIn case of an ASMedia ASM1062 PCIe SATA controller which does not support\nASPM, on entry to suspend or during platform pm_test, the SATA controller\nenters D3hot state and the link enters L1 state. If the SATA controller\nwakes up before rcar_pcie_wakeup() was called and returns to D0, the link\nreturns to L0 before the controller driver even started its transition to\nL1 link state. At this point, the SATA controller did send an PM_ENTER_L1\nDLLP to the PCIe controller and the PCIe controller received it, and the\nPCIe controller did set PMSR PMEL1RX bit.\n\nOnce rcar_pcie_wakeup() is called, if the link is already back in L0 state\nand PMEL1RX bit is set, the controller driver has no way to determine if\nit should perform the link transition to L1 state, or treat the link as if\nit is in L0 state. Currently the driver attempts to perform the transition\nto L1 link state unconditionally, which in this specific case fails with a\nPMSR L1FAEG poll timeout, however the link still works as it is already\nback in L0 state.\n\nReduce this warning verbosity. In case the link is really broken, the\nrcar_pcie_config_access() would fail, otherwise it will succeed and any\nsystem with this controller and ASM1062 can suspend without generating\na backtrace."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-05T09:41:37.546Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/2ae4769332dfdb97f4b6f5dc9ac8f46d02aaa3df"
        },
        {
          "url": "https://git.kernel.org/stable/c/526a877c6273d4cd0d0aede84c1d620479764b1c"
        },
        {
          "url": "https://git.kernel.org/stable/c/3ff3bdde950f1840df4030726cef156758a244d7"
        },
        {
          "url": "https://git.kernel.org/stable/c/c93637e6a4c4e1d0e85ef7efac78d066bbb24d96"
        }
      ],
      "title": "PCI: rcar: Demote WARN() to dev_warn_ratelimited() in rcar_pcie_wakeup()",
      "x_generator": {
        "engine": "bippy-9e1c9544281a"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-43876",
    "datePublished": "2024-08-21T00:06:28.260Z",
    "dateReserved": "2024-08-17T09:11:59.281Z",
    "dateUpdated": "2024-11-05T09:41:37.546Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-43876\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-08-21T01:15:11.973\",\"lastModified\":\"2024-08-21T12:30:33.697\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nPCI: rcar: Demote WARN() to dev_warn_ratelimited() in rcar_pcie_wakeup()\\n\\nAvoid large backtrace, it is sufficient to warn the user that there has\\nbeen a link problem. Either the link has failed and the system is in need\\nof maintenance, or the link continues to work and user has been informed.\\nThe message from the warning can be looked up in the sources.\\n\\nThis makes an actual link issue less verbose.\\n\\nFirst of all, this controller has a limitation in that the controller\\ndriver has to assist the hardware with transition to L1 link state by\\nwriting L1IATN to PMCTRL register, the L1 and L0 link state switching\\nis not fully automatic on this controller.\\n\\nIn case of an ASMedia ASM1062 PCIe SATA controller which does not support\\nASPM, on entry to suspend or during platform pm_test, the SATA controller\\nenters D3hot state and the link enters L1 state. If the SATA controller\\nwakes up before rcar_pcie_wakeup() was called and returns to D0, the link\\nreturns to L0 before the controller driver even started its transition to\\nL1 link state. At this point, the SATA controller did send an PM_ENTER_L1\\nDLLP to the PCIe controller and the PCIe controller received it, and the\\nPCIe controller did set PMSR PMEL1RX bit.\\n\\nOnce rcar_pcie_wakeup() is called, if the link is already back in L0 state\\nand PMEL1RX bit is set, the controller driver has no way to determine if\\nit should perform the link transition to L1 state, or treat the link as if\\nit is in L0 state. Currently the driver attempts to perform the transition\\nto L1 link state unconditionally, which in this specific case fails with a\\nPMSR L1FAEG poll timeout, however the link still works as it is already\\nback in L0 state.\\n\\nReduce this warning verbosity. In case the link is really broken, the\\nrcar_pcie_config_access() would fail, otherwise it will succeed and any\\nsystem with this controller and ASM1062 can suspend without generating\\na backtrace.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: PCI: rcar: Degradar WARN() a dev_warn_ratelimited() en rcar_pcie_wakeup() Evitar un gran backtrace, basta con avisar al usuario que ha habido un problema de enlace. O el enlace fall\u00f3 y el sistema necesita mantenimiento, o el enlace contin\u00faa funcionando y el usuario ha sido informado. El mensaje de la advertencia se puede buscar en las fuentes. Esto hace que un problema de enlace real sea menos detallado. En primer lugar, este controlador tiene una limitaci\u00f3n en el sentido de que el controlador del controlador tiene que ayudar al hardware con la transici\u00f3n al estado de enlace L1 escribiendo L1IATN en el registro PMCTRL; el cambio de estado de enlace L1 y L0 no es completamente autom\u00e1tico en este controlador. En el caso de un controlador ASMedia ASM1062 PCIe SATA que no admite ASPM, al entrar a suspender o durante la plataforma pm_test, el controlador SATA ingresa al estado D3hot y el enlace ingresa al estado L1. Si el controlador SATA se activa antes de que se llamara a rcar_pcie_wakeup() y regresa a D0, el enlace regresa a L0 antes de que el controlador del controlador comenzara su transici\u00f3n al estado de enlace L1. En este punto, el controlador SATA envi\u00f3 un DLLP PM_ENTER_L1 al controlador PCIe y el controlador PCIe lo recibi\u00f3, y el controlador PCIe configur\u00f3 el bit PMSR PMEL1RX. Una vez que se llama a rcar_pcie_wakeup(), si el enlace ya est\u00e1 nuevamente en el estado L0 y el bit PMEL1RX est\u00e1 configurado, el controlador del controlador no tiene forma de determinar si debe realizar la transici\u00f3n del enlace al estado L1 o tratar el enlace como si estuviera en estado L0. Estado L0. Actualmente, el controlador intenta realizar la transici\u00f3n al estado del enlace L1 incondicionalmente, lo que en este caso espec\u00edfico falla con un tiempo de espera de sondeo PMSR L1FAEG; sin embargo, el enlace a\u00fan funciona porque ya est\u00e1 nuevamente en el estado L0. Reduzca la verbosidad de esta advertencia. En caso de que el enlace est\u00e9 realmente roto, rcar_pcie_config_access() fallar\u00e1; de lo contrario, tendr\u00e1 \u00e9xito y cualquier sistema con este controlador y ASM1062 puede suspenderse sin generar un seguimiento.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/2ae4769332dfdb97f4b6f5dc9ac8f46d02aaa3df\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3ff3bdde950f1840df4030726cef156758a244d7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/526a877c6273d4cd0d0aede84c1d620479764b1c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c93637e6a4c4e1d0e85ef7efac78d066bbb24d96\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.