First published: Sat Mar 02 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: spi: sun6i: reduce DMA RX transfer width to single byte Through empirical testing it has been determined that sometimes RX SPI transfers with DMA enabled return corrupted data. This is down to single or even multiple bytes lost during DMA transfer from SPI peripheral to memory. It seems the RX FIFO within the SPI peripheral can become confused when performing bus read accesses wider than a single byte to it during an active SPI transfer. This patch reduces the width of individual DMA read accesses to the RX FIFO to a single byte to mitigate that issue.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel | ||
Linux Kernel | <5.15.134 | |
Linux Kernel | >=5.16<6.1.56 | |
Linux Kernel | >=6.2<6.5.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52511 has been assessed with a medium severity due to the potential for data corruption during RX SPI transfers.
To remediate CVE-2023-52511, update your Linux kernel to the latest version where this vulnerability has been addressed.
CVE-2023-52511 affects systems running the Linux kernel, particularly those using SPI with DMA enabled.
The impact of CVE-2023-52511 includes the possibility of receiving corrupted data from DMA RX transfers in SPI communication.
CVE-2023-52511 was disclosed in 2023, and specific patches have been made available shortly thereafter.