CVE-2024-26977

In the Linux kernel, the following vulnerability has been resolved: pci_iounmap(): Fix MMIO mapping leak The #ifdef ARCH_HAS_GENERIC_IOPORT_MAP accidentally also guards iounmap(), which means MMIO mappings are leaked. Move the guard so we call iounmap() for MMIO mappings.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc7:*:*:*:*:*:*

History

18 Sep 2025, 14:36

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/5e4b23e7a7b33a1e56bfa3e5598138a2234d55b6 - () https://git.kernel.org/stable/c/5e4b23e7a7b33a1e56bfa3e5598138a2234d55b6 - Patch
References () https://git.kernel.org/stable/c/6d21d0356aa44157a62e39c0d1a13d4c69a8d0c8 - () https://git.kernel.org/stable/c/6d21d0356aa44157a62e39c0d1a13d4c69a8d0c8 - Patch
References () https://git.kernel.org/stable/c/7626913652cc786c238e2dd7d8740b17d41b2637 - () https://git.kernel.org/stable/c/7626913652cc786c238e2dd7d8740b17d41b2637 - Patch
References () https://git.kernel.org/stable/c/af280e137e273935f2e09f4d73169998298792ed - () https://git.kernel.org/stable/c/af280e137e273935f2e09f4d73169998298792ed - Patch
References () https://git.kernel.org/stable/c/b5d40f02e7222da032c2042aebcf2a07de9b342f - () https://git.kernel.org/stable/c/b5d40f02e7222da032c2042aebcf2a07de9b342f - Patch
References () https://git.kernel.org/stable/c/f3749345a9b7295dd071d0ed589634cb46364f77 - () https://git.kernel.org/stable/c/f3749345a9b7295dd071d0ed589634cb46364f77 - Patch
First Time Linux linux Kernel
Linux
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:5.15:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*

21 Nov 2024, 09:03

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/5e4b23e7a7b33a1e56bfa3e5598138a2234d55b6 - () https://git.kernel.org/stable/c/5e4b23e7a7b33a1e56bfa3e5598138a2234d55b6 -
References () https://git.kernel.org/stable/c/6d21d0356aa44157a62e39c0d1a13d4c69a8d0c8 - () https://git.kernel.org/stable/c/6d21d0356aa44157a62e39c0d1a13d4c69a8d0c8 -
References () https://git.kernel.org/stable/c/7626913652cc786c238e2dd7d8740b17d41b2637 - () https://git.kernel.org/stable/c/7626913652cc786c238e2dd7d8740b17d41b2637 -
References () https://git.kernel.org/stable/c/af280e137e273935f2e09f4d73169998298792ed - () https://git.kernel.org/stable/c/af280e137e273935f2e09f4d73169998298792ed -
References () https://git.kernel.org/stable/c/b5d40f02e7222da032c2042aebcf2a07de9b342f - () https://git.kernel.org/stable/c/b5d40f02e7222da032c2042aebcf2a07de9b342f -
References () https://git.kernel.org/stable/c/f3749345a9b7295dd071d0ed589634cb46364f77 - () https://git.kernel.org/stable/c/f3749345a9b7295dd071d0ed589634cb46364f77 -

31 Oct 2024, 16:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: pci_iounmap(): corrige la fuga de mapeo MMIO El #ifdef ARCH_HAS_GENERIC_IOPORT_MAP accidentalmente también protege iounmap(), lo que significa que se filtraron los mapeos MMIO. Mueva la guardia para que llamemos a iounmap() para asignaciones MMIO.

01 May 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-01 06:15

Updated : 2025-09-18 14:36


NVD link : CVE-2024-26977

Mitre link : CVE-2024-26977

CVE.ORG link : CVE-2024-26977


JSON object : View

Products Affected

linux

  • linux_kernel