Executive Summary

Informations
Name CVE-2024-47667 First vendor Publication 2024-10-09
Vendor Cve Last vendor Modification 2024-10-23

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0)

Errata #i2037 in AM65x/DRA80xM Processors Silicon Revision 1.0 (SPRZ452D_July 2018_Revised December 2019 [1]) mentions when an inbound PCIe TLP spans more than two internal AXI 128-byte bursts, the bus may corrupt the packet payload and the corrupt data may cause associated applications or the processor to hang.

The workaround for Errata #i2037 is to limit the maximum read request size and maximum payload size to 128 bytes. Add workaround for Errata #i2037 here.

The errata and workaround is applicable only to AM65x SR 1.0 and later versions of the silicon will have this fixed.

[1] -> https://www.ti.com/lit/er/sprz452i/sprz452i.pdf

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47667

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3626

Sources (Detail)

https://git.kernel.org/stable/c/135843c351c08df72bdd4b4ebea53c8052a76881
https://git.kernel.org/stable/c/576d0fb6f8d4bd4695e70eee173a1b9c7bae9572
https://git.kernel.org/stable/c/86f271f22bbb6391410a07e08d6ca3757fda01fa
https://git.kernel.org/stable/c/af218c803fe298ddf00abef331aa526b20d7ea61
https://git.kernel.org/stable/c/cfb006e185f64edbbdf7869eac352442bc76b8f6
https://git.kernel.org/stable/c/dd47051c76c8acd8cb983f01b4d1265da29cb66a
https://git.kernel.org/stable/c/ebbdbbc580c1695dec283d0ba6448729dc993246
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2024-11-23 03:03:45
  • Multiple Updates
2024-11-22 03:01:54
  • Multiple Updates
2024-11-20 03:00:13
  • Multiple Updates
2024-11-14 03:00:31
  • Multiple Updates
2024-11-09 03:00:31
  • Multiple Updates
2024-10-26 00:28:58
  • Multiple Updates
2024-10-25 21:29:52
  • Multiple Updates
2024-10-25 00:28:59
  • Multiple Updates
2024-10-24 17:28:05
  • Multiple Updates
2024-10-23 21:28:30
  • Multiple Updates
2024-10-10 17:27:28
  • Multiple Updates
2024-10-09 21:27:27
  • First insertion