CVE-2023-52511

In the Linux kernel, the following vulnerability has been resolved: spi: sun6i: reduce DMA RX transfer width to single byte Through empirical testing it has been determined that sometimes RX SPI transfers with DMA enabled return corrupted data. This is down to single or even multiple bytes lost during DMA transfer from SPI peripheral to memory. It seems the RX FIFO within the SPI peripheral can become confused when performing bus read accesses wider than a single byte to it during an active SPI transfer. This patch reduces the width of individual DMA read accesses to the RX FIFO to a single byte to mitigate that issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

29 Apr 2025, 16:55

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/171f8a49f212e87a8b04087568e1b3d132e36a18 - () https://git.kernel.org/stable/c/171f8a49f212e87a8b04087568e1b3d132e36a18 - Patch
References () https://git.kernel.org/stable/c/b3c21c9c7289692f4019f163c3b06d8bdf78b355 - () https://git.kernel.org/stable/c/b3c21c9c7289692f4019f163c3b06d8bdf78b355 - Patch
References () https://git.kernel.org/stable/c/e15bb292b24630ee832bfc7fd616bd72c7682bbb - () https://git.kernel.org/stable/c/e15bb292b24630ee832bfc7fd616bd72c7682bbb - Patch
References () https://git.kernel.org/stable/c/ff05ed4ae214011464a0156f05cac1b0b46b5fbc - () https://git.kernel.org/stable/c/ff05ed4ae214011464a0156f05cac1b0b46b5fbc - Patch
First Time Linux linux Kernel
Linux

21 Nov 2024, 08:39

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/171f8a49f212e87a8b04087568e1b3d132e36a18 - () https://git.kernel.org/stable/c/171f8a49f212e87a8b04087568e1b3d132e36a18 -
References () https://git.kernel.org/stable/c/b3c21c9c7289692f4019f163c3b06d8bdf78b355 - () https://git.kernel.org/stable/c/b3c21c9c7289692f4019f163c3b06d8bdf78b355 -
References () https://git.kernel.org/stable/c/e15bb292b24630ee832bfc7fd616bd72c7682bbb - () https://git.kernel.org/stable/c/e15bb292b24630ee832bfc7fd616bd72c7682bbb -
References () https://git.kernel.org/stable/c/ff05ed4ae214011464a0156f05cac1b0b46b5fbc - () https://git.kernel.org/stable/c/ff05ed4ae214011464a0156f05cac1b0b46b5fbc -

06 Nov 2024, 19:35

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: sun6i: reduce el ancho de transferencia DMA RX a un solo byte. Mediante pruebas empíricas se ha determinado que a veces las transferencias RX SPI con DMA habilitado devuelven datos corruptos. Esto se debe a la pérdida de uno o incluso varios bytes durante la transferencia DMA desde el periférico SPI a la memoria. Parece que el RX FIFO dentro del periférico SPI puede confundirse cuando se realizan accesos de lectura al bus de más de un byte durante una transferencia SPI activa. Este parche reduce el ancho de los accesos de lectura de DMA individuales al RX FIFO a un solo byte para mitigar ese problema.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3

02 Mar 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-02 22:15

Updated : 2025-04-29 16:55


NVD link : CVE-2023-52511

Mitre link : CVE-2023-52511

CVE.ORG link : CVE-2023-52511


JSON object : View

Products Affected

linux

  • linux_kernel