Skip to main content

CVE-2024-58093: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-58093cvecve-2024-58093
Published: Wed Apr 16 2025 (04/16/2025, 14:11:42 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: PCI/ASPM: Fix link state exit during switch upstream function removal Before 456d8aa37d0f ("PCI/ASPM: Disable ASPM on MFD function removal to avoid use-after-free"), we would free the ASPM link only after the last function on the bus pertaining to the given link was removed. That was too late. If function 0 is removed before sibling function, link->downstream would point to free'd memory after. After above change, we freed the ASPM parent link state upon any function removal on the bus pertaining to a given link. That is too early. If the link is to a PCIe switch with MFD on the upstream port, then removing functions other than 0 first would free a link which still remains parent_link to the remaining downstream ports. The resulting GPFs are especially frequent during hot-unplug, because pciehp removes devices on the link bus in reverse order. On that switch, function 0 is the virtual P2P bridge to the internal bus. Free exactly when function 0 is removed -- before the parent link is obsolete, but after all subordinate links are gone. [kwilczynski: commit log]

AI-Powered Analysis

AILast updated: 07/03/2025, 19:43:02 UTC

Technical Analysis

CVE-2024-58093 is a vulnerability in the Linux kernel related to the handling of PCI Express Active State Power Management (ASPM) link state during the removal of upstream functions on PCIe switches with Multi-Function Device (MFD) configurations. The issue arises from improper timing in freeing the ASPM parent link state when functions on the PCIe bus are removed. Initially, the ASPM link was freed only after the last function on the bus was removed, which led to use-after-free conditions if function 0 was removed before sibling functions, causing the downstream pointer to reference freed memory. A subsequent patch attempted to free the ASPM parent link state upon any function removal, but this was premature for PCIe switches with MFD on the upstream port, as other downstream ports still referenced the parent link, leading to general protection faults (GPFs), especially during hot-unplug operations where devices are removed in reverse order. The final resolution was to free the ASPM link exactly when function 0 is removed—after all subordinate links are gone but before the parent link becomes obsolete. This fix prevents use-after-free and GPFs during device removal sequences. The vulnerability affects multiple Linux kernel versions identified by specific commit hashes and is particularly relevant for systems using PCIe switches with MFD configurations. No known exploits are reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, especially those operating data centers, telecommunications infrastructure, or industrial control systems relying on Linux-based servers and embedded systems with PCIe hardware, this vulnerability could cause system instability or crashes during hardware hot-unplug events. The use-after-free and resulting general protection faults can lead to kernel panics or system reboots, impacting availability and potentially causing downtime. While there is no indication of direct confidentiality or integrity compromise, the disruption of critical systems could affect business continuity and operational reliability. Organizations running Linux kernels with affected versions on hardware platforms utilizing PCIe switches with MFD are at risk. This is particularly relevant in sectors with high hardware churn or dynamic hardware configurations, such as cloud providers, telecom operators, and manufacturing facilities. The absence of known exploits reduces immediate risk, but the vulnerability's nature means that improper device removal sequences could inadvertently trigger system failures, impacting service availability.

Mitigation Recommendations

Organizations should promptly update their Linux kernel to versions that include the fix for CVE-2024-58093. Kernel updates should be tested in staging environments to ensure compatibility with existing PCIe hardware configurations, especially those involving PCIe switches with MFD. For environments where immediate patching is not feasible, administrators should minimize hot-unplug operations or ensure that device removal sequences follow the correct order, removing function 0 last to avoid triggering the vulnerability. Monitoring kernel logs for general protection faults or related errors during device removal can help detect attempts to exploit or inadvertently trigger the issue. Additionally, hardware vendors and system integrators should verify firmware and driver compatibility with patched kernels to prevent regressions. Implementing robust change management and hardware maintenance procedures that account for this vulnerability will reduce the risk of system crashes. Finally, organizations should maintain up-to-date inventories of hardware using PCIe switches with MFD to identify potentially affected systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-03-06T15:52:09.188Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9820c4522896dcbdd271

Added to database: 5/21/2025, 9:08:48 AM

Last enriched: 7/3/2025, 7:43:02 PM

Last updated: 8/18/2025, 2:45:55 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats