Skip to main content

CVE-2024-47667: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-47667cvecve-2024-47667
Published: Wed Oct 09 2024 (10/09/2024, 14:13:59 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) Errata #i2037 in AM65x/DRA80xM Processors Silicon Revision 1.0 (SPRZ452D_July 2018_Revised December 2019 [1]) mentions when an inbound PCIe TLP spans more than two internal AXI 128-byte bursts, the bus may corrupt the packet payload and the corrupt data may cause associated applications or the processor to hang. The workaround for Errata #i2037 is to limit the maximum read request size and maximum payload size to 128 bytes. Add workaround for Errata #i2037 here. The errata and workaround is applicable only to AM65x SR 1.0 and later versions of the silicon will have this fixed. [1] -> https://www.ti.com/lit/er/sprz452i/sprz452i.pdf

AI-Powered Analysis

AILast updated: 06/28/2025, 19:12:42 UTC

Technical Analysis

CVE-2024-47667 addresses a hardware erratum (Errata #i2037) affecting the AM65x and DRA80xM processors, specifically silicon revision 1.0. The erratum involves the PCIe interface within these processors, where an inbound PCIe Transaction Layer Packet (TLP) that spans more than two internal AXI 128-byte bursts may experience corruption of the packet payload. This corruption can lead to data integrity issues and potentially cause the affected processor or associated applications to hang or become unresponsive. The Linux kernel vulnerability arises because the kernel's PCI subsystem did not originally implement a workaround for this hardware erratum, thus exposing systems using these processors to the risk of instability or denial of service. The mitigation implemented in the Linux kernel limits the maximum read request size and maximum payload size to 128 bytes, effectively preventing TLPs from spanning more than two AXI bursts and avoiding the corruption. This workaround applies only to silicon revision 1.0 of the AM65x processors; later silicon revisions have this issue resolved at the hardware level. The vulnerability is specific to systems running Linux on these affected processors and is not a software bug per se but a hardware erratum requiring kernel-level mitigation. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The issue is documented in Texas Instruments' errata documentation (SPRZ452D) and has been addressed in the Linux kernel source code.

Potential Impact

For European organizations utilizing embedded systems, industrial control systems, or specialized computing platforms based on AM65x or DRA80xM processors running Linux, this vulnerability could lead to system instability or denial of service due to processor hangs caused by corrupted PCIe transactions. Such disruptions could affect critical infrastructure, manufacturing automation, telecommunications equipment, or other industrial IoT deployments common in Europe. While the vulnerability does not directly expose confidentiality or integrity breaches, the availability impact could be significant in operational technology environments where uptime and reliability are paramount. The risk is limited to hardware using the affected silicon revision and Linux kernel versions lacking the workaround. Given the niche nature of the affected hardware, the impact on mainstream IT infrastructure is minimal. However, organizations relying on these processors in embedded or industrial contexts should prioritize patching to avoid unexpected system failures that could disrupt business operations or safety-critical processes.

Mitigation Recommendations

European organizations should first identify whether their systems use AM65x or DRA80xM processors with silicon revision 1.0. This can be done by consulting hardware documentation or vendor support. Next, ensure that Linux kernel versions deployed on these systems include the patch that limits the PCIe maximum read request size and payload size to 128 bytes. If the kernel is custom-built, rebuild it with the relevant patch applied. For systems where kernel updates are not immediately feasible, consider implementing hardware or firmware-level mitigations if available from the hardware vendor. Additionally, monitor system logs and PCIe bus activity for signs of packet corruption or system hangs. Engage with hardware vendors for updated silicon revisions or replacement hardware if long-term mitigation is required. Finally, incorporate this vulnerability assessment into the organization's asset management and patch management processes to ensure timely updates and risk reduction.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-30T16:00:12.936Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe0460

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 7:12:42 PM

Last updated: 7/31/2025, 4:40:02 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats