In the Linux kernel, the following vulnerability has been resolved:
mmc: mmci: stm32: fix DMA API overlapping mappings warning
Turning on CONFIG_DMA_API_DEBUG_SG results in the following warning:
DMA-API: mmci-pl18x 48220000.mmc: cacheline tracking EEXIST,
overlapping mappings aren't supported
WARNING: CPU: 1 PID: 51 at kernel/dma/debug.c:568
add_dma_entry+0x234/0x2f4
Modules linked in:
CPU: 1 PID: 51 Comm: kworker/1:2 Not tainted 6.1.28 #1
Hardware name: STMicroelectronics STM32MP257F-EV1 Evaluation Board (DT)
Workqueue: events_freezable mmc_rescan
Call trace:
add_dma_entry+0x234/0x2f4
debug_dma_map_sg+0x198/0x350
__dma_map_sg_attrs+0xa0/0x110
dma_map_sg_attrs+0x10/0x2c
sdmmc_idma_prep_data+0x80/0xc0
mmci_prep_data+0x38/0x84
mmci_start_data+0x108/0x2dc
mmci_request+0xe4/0x190
__mmc_start_request+0x68/0x140
mmc_start_request+0x94/0xc0
mmc_wait_for_req+0x70/0x100
mmc_send_tuning+0x108/0x1ac
sdmmc_execute_tuning+0x14c/0x210
mmc_execute_tuning+0x48/0xec
mmc_sd_init_uhs_card.part.0+0x208/0x464
mmc_sd_init_card+0x318/0x89c
mmc_attach_sd+0xe4/0x180
mmc_rescan+0x244/0x320
DMA API debug brings to light leaking dma-mappings as dma_map_sg and
dma_unmap_sg are not correctly balanced.
If an error occurs in mmci_cmd_irq function, only mmci_dma_error
function is called and as this API is not managed on stm32 variant,
dma_unmap_sg is never called in this error path.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
20 Mar 2025, 10:39
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
References | () https://git.kernel.org/stable/c/0224cbc53ba82b84affa7619b6d1b1a254bc2c53 - Patch | |
References | () https://git.kernel.org/stable/c/176e66269f0de327375fc0ea51c12c2f5a97e4c4 - Patch | |
References | () https://git.kernel.org/stable/c/5ae5060e17a3fc38e54c3e5bd8abd6b1d5bfae7c - Patch | |
References | () https://git.kernel.org/stable/c/6b1ba3f9040be5efc4396d86c9752cdc564730be - Patch | |
References | () https://git.kernel.org/stable/c/70af82bb9c897faa25a44e4181f36c60312b71ef - Patch | |
References | () https://git.kernel.org/stable/c/d610a307225951929b9dff807788439454476f85 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List | |
CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:* |
|
First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
21 Nov 2024, 09:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/0224cbc53ba82b84affa7619b6d1b1a254bc2c53 - | |
References | () https://git.kernel.org/stable/c/176e66269f0de327375fc0ea51c12c2f5a97e4c4 - | |
References | () https://git.kernel.org/stable/c/5ae5060e17a3fc38e54c3e5bd8abd6b1d5bfae7c - | |
References | () https://git.kernel.org/stable/c/6b1ba3f9040be5efc4396d86c9752cdc564730be - | |
References | () https://git.kernel.org/stable/c/70af82bb9c897faa25a44e4181f36c60312b71ef - | |
References | () https://git.kernel.org/stable/c/d610a307225951929b9dff807788439454476f85 - |
05 Nov 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Apr 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-04 09:15
Updated : 2025-03-20 10:39
NVD link : CVE-2024-26787
Mitre link : CVE-2024-26787
CVE.ORG link : CVE-2024-26787
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE