{"id":"CVE-2023-54255","summary":"sh: dma: Fix DMA channel offset calculation","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nsh: dma: Fix DMA channel offset calculation\n\nVarious SoCs of the SH3, SH4 and SH4A family, which use this driver,\nfeature a differing number of DMA channels, which can be distributed\nbetween up to two DMAC modules. The existing implementation fails to\ncorrectly accommodate for all those variations, resulting in wrong\nchannel offset calculations and leading to kernel panics.\n\nRewrite dma_base_addr() in order to properly calculate channel offsets\nin a DMAC module. Fix dmaor_read_reg() and dmaor_write_reg(), so that\nthe correct DMAC module base is selected for the DMAOR register.","modified":"2026-03-31T17:29:53.161657066Z","published":"2025-12-30T12:15:50.822Z","related":["SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54255.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/196f6c71905aa384c0177acf194a1144d480333b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/479380acfa63247b5ac62476138f847aefc62692"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4989627157735c1f1619f08e5bc1592418e7c878"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8fb11fa4805699c6b73a9c8a9d45807f9874abe3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bca700b48c72f4ffeee977a2ed0eb4a6b4b7b8ad"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d1c946552af299f4fa85bf7da15e328123771128"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e82e47584847129a20b8c9f4a1dcde09374fb0e0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e9e33faea104381bac80ac79328f0540fc2969f2"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54255.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54255"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"7f47c7189b3e8f19a589f77a3ad169d7b691b582"},{"fixed":"bca700b48c72f4ffeee977a2ed0eb4a6b4b7b8ad"},{"fixed":"479380acfa63247b5ac62476138f847aefc62692"},{"fixed":"4989627157735c1f1619f08e5bc1592418e7c878"},{"fixed":"d1c946552af299f4fa85bf7da15e328123771128"},{"fixed":"196f6c71905aa384c0177acf194a1144d480333b"},{"fixed":"8fb11fa4805699c6b73a9c8a9d45807f9874abe3"},{"fixed":"e9e33faea104381bac80ac79328f0540fc2969f2"},{"fixed":"e82e47584847129a20b8c9f4a1dcde09374fb0e0"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54255.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.5.0"},{"fixed":"4.14.322"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.291"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.251"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.188"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.121"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.39"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.4.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54255.json"}}],"schema_version":"1.7.5"}