๐Ÿ” CVE Alert

CVE-2024-47667

UNKNOWN 0.0

PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0)

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) Errata #i2037 in AM65x/DRA80xM Processors Silicon Revision 1.0 (SPRZ452D_July 2018_Revised December 2019 [1]) mentions when an inbound PCIe TLP spans more than two internal AXI 128-byte bursts, the bus may corrupt the packet payload and the corrupt data may cause associated applications or the processor to hang. The workaround for Errata #i2037 is to limit the maximum read request size and maximum payload size to 128 bytes. Add workaround for Errata #i2037 here. The errata and workaround is applicable only to AM65x SR 1.0 and later versions of the silicon will have this fixed. [1] -> https://www.ti.com/lit/er/sprz452i/sprz452i.pdf

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 9, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
18b0415bc802a8bab5dedba5ae2757e83259e6ee < cfb006e185f64edbbdf7869eac352442bc76b8f6 18b0415bc802a8bab5dedba5ae2757e83259e6ee < ebbdbbc580c1695dec283d0ba6448729dc993246 18b0415bc802a8bab5dedba5ae2757e83259e6ee < 135843c351c08df72bdd4b4ebea53c8052a76881 18b0415bc802a8bab5dedba5ae2757e83259e6ee < af218c803fe298ddf00abef331aa526b20d7ea61 18b0415bc802a8bab5dedba5ae2757e83259e6ee < 576d0fb6f8d4bd4695e70eee173a1b9c7bae9572 18b0415bc802a8bab5dedba5ae2757e83259e6ee < dd47051c76c8acd8cb983f01b4d1265da29cb66a 18b0415bc802a8bab5dedba5ae2757e83259e6ee < 86f271f22bbb6391410a07e08d6ca3757fda01fa
Linux / Linux
5.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/cfb006e185f64edbbdf7869eac352442bc76b8f6 git.kernel.org: https://git.kernel.org/stable/c/ebbdbbc580c1695dec283d0ba6448729dc993246 git.kernel.org: https://git.kernel.org/stable/c/135843c351c08df72bdd4b4ebea53c8052a76881 git.kernel.org: https://git.kernel.org/stable/c/af218c803fe298ddf00abef331aa526b20d7ea61 git.kernel.org: https://git.kernel.org/stable/c/576d0fb6f8d4bd4695e70eee173a1b9c7bae9572 git.kernel.org: https://git.kernel.org/stable/c/dd47051c76c8acd8cb983f01b4d1265da29cb66a git.kernel.org: https://git.kernel.org/stable/c/86f271f22bbb6391410a07e08d6ca3757fda01fa lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html