Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2023-52519
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-02 Mar, 2024 | 21:52
Updated At-04 May, 2025 | 07:38
Rejected At-
▼CVE Numbering Authority (CNA)
HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit

In the Linux kernel, the following vulnerability has been resolved: HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit The EHL (Elkhart Lake) based platforms provide a OOB (Out of band) service, which allows to wakup device when the system is in S5 (Soft-Off state). This OOB service can be enabled/disabled from BIOS settings. When enabled, the ISH device gets PME wake capability. To enable PME wakeup, driver also needs to enable ACPI GPE bit. On resume, BIOS will clear the wakeup bit. So driver need to re-enable it in resume function to keep the next wakeup capability. But this BIOS clearing of wakeup bit doesn't decrement internal OS GPE reference count, so this reenabling on every resume will cause reference count to overflow. So first disable and reenable ACPI GPE bit using acpi_disable_gpe().

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/hid/intel-ish-hid/ipc/pci-ish.c
Default Status
unaffected
Versions
Affected
  • From 2e23a70edabe933284f690dff49497fb6b82b0e5 before 8781fe259dd5a178fdd1069401bbd1437f9491c5 (git)
  • From 2e23a70edabe933284f690dff49497fb6b82b0e5 before cdcc04e844a2d22d9d25cef1e8e504a174ea9f8f (git)
  • From 2e23a70edabe933284f690dff49497fb6b82b0e5 before 60fb3f054c99608ddb1f2466c07108da6292951e (git)
  • From 2e23a70edabe933284f690dff49497fb6b82b0e5 before 8f02139ad9a7e6e5c05712f8c1501eebed8eacfd (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/hid/intel-ish-hid/ipc/pci-ish.c
Default Status
affected
Versions
Affected
  • 5.12
Unaffected
  • From 0 before 5.12 (semver)
  • From 5.15.135 through 5.15.* (semver)
  • From 6.1.57 through 6.1.* (semver)
  • From 6.5.7 through 6.5.* (semver)
  • From 6.6 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/8781fe259dd5a178fdd1069401bbd1437f9491c5
N/A
https://git.kernel.org/stable/c/cdcc04e844a2d22d9d25cef1e8e504a174ea9f8f
N/A
https://git.kernel.org/stable/c/60fb3f054c99608ddb1f2466c07108da6292951e
N/A
https://git.kernel.org/stable/c/8f02139ad9a7e6e5c05712f8c1501eebed8eacfd
N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/8781fe259dd5a178fdd1069401bbd1437f9491c5
x_transferred
https://git.kernel.org/stable/c/cdcc04e844a2d22d9d25cef1e8e504a174ea9f8f
x_transferred
https://git.kernel.org/stable/c/60fb3f054c99608ddb1f2466c07108da6292951e
x_transferred
https://git.kernel.org/stable/c/8f02139ad9a7e6e5c05712f8c1501eebed8eacfd
x_transferred
Details not found