Bug 2317603 (CVE-2024-47667) - CVE-2024-47667 kernel: PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0)
Summary: CVE-2024-47667 kernel: PCI: keystone: Add workaround for Errata #i2037 (AM65x...
Keywords:
Status: NEW
Alias: CVE-2024-47667
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2318108
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-10-09 15:03 UTC by OSIDB Bzimport
Modified: 2024-10-11 17:58 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-10-09 15:03:45 UTC
In the Linux kernel, the following vulnerability has been resolved:

PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0)

Errata #i2037 in AM65x/DRA80xM Processors Silicon Revision 1.0
(SPRZ452D_July 2018_Revised December 2019 [1]) mentions when an
inbound PCIe TLP spans more than two internal AXI 128-byte bursts,
the bus may corrupt the packet payload and the corrupt data may
cause associated applications or the processor to hang.

The workaround for Errata #i2037 is to limit the maximum read
request size and maximum payload size to 128 bytes. Add workaround
for Errata #i2037 here.

The errata and workaround is applicable only to AM65x SR 1.0 and
later versions of the silicon will have this fixed.

[1] -> https://www.ti.com/lit/er/sprz452i/sprz452i.pdf

Comment 1 Mauro Matteo Cascella 2024-10-11 16:18:18 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2024100905-CVE-2024-47667-2d01@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.