CVE-2023-52511
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
02/03/2024
Last modified:
29/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
spi: sun6i: reduce DMA RX transfer width to single byte<br />
<br />
Through empirical testing it has been determined that sometimes RX SPI<br />
transfers with DMA enabled return corrupted data. This is down to single<br />
or even multiple bytes lost during DMA transfer from SPI peripheral to<br />
memory. It seems the RX FIFO within the SPI peripheral can become<br />
confused when performing bus read accesses wider than a single byte to it<br />
during an active SPI transfer.<br />
<br />
This patch reduces the width of individual DMA read accesses to the<br />
RX FIFO to a single byte to mitigate that issue.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.134 (excluding) | |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.56 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.5.6 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/171f8a49f212e87a8b04087568e1b3d132e36a18
- https://git.kernel.org/stable/c/b3c21c9c7289692f4019f163c3b06d8bdf78b355
- https://git.kernel.org/stable/c/e15bb292b24630ee832bfc7fd616bd72c7682bbb
- https://git.kernel.org/stable/c/ff05ed4ae214011464a0156f05cac1b0b46b5fbc
- https://git.kernel.org/stable/c/171f8a49f212e87a8b04087568e1b3d132e36a18
- https://git.kernel.org/stable/c/b3c21c9c7289692f4019f163c3b06d8bdf78b355
- https://git.kernel.org/stable/c/e15bb292b24630ee832bfc7fd616bd72c7682bbb
- https://git.kernel.org/stable/c/ff05ed4ae214011464a0156f05cac1b0b46b5fbc