
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-47667 affects the Linux kernel's PCI keystone driver. The vulnerability is related to Errata #i2037 in AM65x/DRA80xM Processors Silicon Revision 1.0, where inbound PCIe TLP spanning more than two internal AXI 128-byte bursts can cause packet payload corruption and system hangs. The issue was discovered and disclosed in October 2024 (NVD).
The vulnerability occurs when an inbound PCIe TLP (Transaction Layer Packet) spans more than two internal AXI 128-byte bursts in the AM65x SR 1.0 hardware. This can lead to bus corruption of the packet payload. The issue has a CVSS v3.1 base score of 5.5 (Medium) with vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
When exploited, this vulnerability can cause packet payload corruption and system hangs, potentially affecting associated applications and the processor's stability. The impact is primarily on system availability, with no direct impact on confidentiality or integrity (NVD).
The workaround implemented in the Linux kernel limits the maximum read request size and maximum payload size to 128 bytes for affected devices. This fix has been applied through patches in various kernel versions. The issue is fixed in later versions of the AM65x silicon (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."