
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability was discovered in the Linux kernel's PCI/ASPM (Active State Power Management) functionality, identified as CVE-2023-53446. The vulnerability was reported on September 18, 2025, affecting the Linux kernel's handling of multi-function device power management (NVD).
The vulnerability occurs when handling the pcielinkstate->downstream pointer, which points to the pci_dev of function 0. The issue arises when function 0 is removed while retaining the pointer, leading to subsequent ASPM policy changes dereferencing a freed pointer. This results in a use-after-free condition that can be triggered through specific system operations, such as removing a PCI device and changing power policy settings (Rapid7).
The vulnerability could potentially lead to system instability or crashes when manipulating PCI device configurations and power management settings. The issue specifically affects the ASPM (Active State Power Management) functionality in multi-function PCI devices, which could impact system power management capabilities (NVD).
The fix involves disabling ASPM and freeing the pcielinkstate when any child function is removed, which prevents the dangling pointer issue while maintaining consistent ASPM Control configuration across all functions. This aligns with PCIe specification r6.0, section 7.5.3.7, which recommends programming the same ASPM Control value in all functions of multi-function devices (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."