CVE-2024-47667

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/10/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0)<br /> <br /> Errata #i2037 in AM65x/DRA80xM Processors Silicon Revision 1.0<br /> (SPRZ452D_July 2018_Revised December 2019 [1]) mentions when an<br /> inbound PCIe TLP spans more than two internal AXI 128-byte bursts,<br /> the bus may corrupt the packet payload and the corrupt data may<br /> cause associated applications or the processor to hang.<br /> <br /> The workaround for Errata #i2037 is to limit the maximum read<br /> request size and maximum payload size to 128 bytes. Add workaround<br /> for Errata #i2037 here.<br /> <br /> The errata and workaround is applicable only to AM65x SR 1.0 and<br /> later versions of the silicon will have this fixed.<br /> <br /> [1] -&gt; https://www.ti.com/lit/er/sprz452i/sprz452i.pdf

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.4.284 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.226 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.167 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.110 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.51 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.10.10 (excluding)