The following table lists the changes that have been made to the
CVE-2025-21831 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by 416baaa9-dc9f-4396-8d5f-8c081fb06d67Mar. 06, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1
commit 9d26d3a8f1b0 (“PCI: Put PCIe ports into D3 during suspend”) sets the
policy that all PCIe ports are allowed to use D3. When the system is
suspended if the port is not power manageable by the platform and won’t be
used for wakeup via a PME this sets up the policy for these ports to go
into D3hot.This policy generally makes sense from an OSPM perspective but it leads to
problems with wakeup from suspend on the TUXEDO Sirius 16 Gen 1 with a
specific old BIOS. This manifests as a system hang.On the affected Device + BIOS combination, add a quirk for the root port of
the problematic controller to ensure that these root ports are not put into
D3hot at suspend.This patch is based on
https://lore.kernel.org/linux-pci/[email protected]
but with the added condition both in the documentation and in the code to
apply only to the TUXEDO Sirius 16 Gen 1 with a specific old BIOS and only
the affected root ports.Added Reference https://git.kernel.org/stable/c/5ee3dd6e59b834e4d66e8b16fc684749ee40a257 Added Reference https://git.kernel.org/stable/c/8852e056e297df1d8635ee7504e780d3184e45d0 Added Reference https://git.kernel.org/stable/c/a78dfe50fffe6058afed2bb04c50c2c9a16664ee Added Reference https://git.kernel.org/stable/c/b1049f2d68693c80a576c4578d96774a68df2bad