CVE-2023-52488
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/03/2024
Last modified:
14/02/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO<br />
<br />
The SC16IS7XX IC supports a burst mode to access the FIFOs where the<br />
initial register address is sent ($00), followed by all the FIFO data<br />
without having to resend the register address each time. In this mode, the<br />
IC doesn&#39;t increment the register address for each R/W byte.<br />
<br />
The regmap_raw_read() and regmap_raw_write() are functions which can<br />
perform IO over multiple registers. They are currently used to read/write<br />
from/to the FIFO, and although they operate correctly in this burst mode on<br />
the SPI bus, they would corrupt the regmap cache if it was not disabled<br />
manually. The reason is that when the R/W size is more than 1 byte, these<br />
functions assume that the register address is incremented and handle the<br />
cache accordingly.<br />
<br />
Convert FIFO R/W functions to use the regmap _noinc_ versions in order to<br />
remove the manual cache control which was a workaround when using the<br />
_raw_ versions. FIFO registers are properly declared as volatile so<br />
cache will not be used/updated for FIFO accesses.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.16 (including) | 6.1.76 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.15 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
- https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
- https://git.kernel.org/stable/c/4e37416e4ee1b1bc17364a68973e0c63be89e611
- https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
- https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
- https://git.kernel.org/stable/c/e635f652696ef6f1230621cfd89c350cb5ec6169
- https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
- https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
- https://git.kernel.org/stable/c/4e37416e4ee1b1bc17364a68973e0c63be89e611
- https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
- https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
- https://git.kernel.org/stable/c/e635f652696ef6f1230621cfd89c350cb5ec6169
- https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html