CVE-2024-26787
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/04/2024
Last modified:
20/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mmc: mmci: stm32: fix DMA API overlapping mappings warning<br />
<br />
Turning on CONFIG_DMA_API_DEBUG_SG results in the following warning:<br />
<br />
DMA-API: mmci-pl18x 48220000.mmc: cacheline tracking EEXIST,<br />
overlapping mappings aren&#39;t supported<br />
WARNING: CPU: 1 PID: 51 at kernel/dma/debug.c:568<br />
add_dma_entry+0x234/0x2f4<br />
Modules linked in:<br />
CPU: 1 PID: 51 Comm: kworker/1:2 Not tainted 6.1.28 #1<br />
Hardware name: STMicroelectronics STM32MP257F-EV1 Evaluation Board (DT)<br />
Workqueue: events_freezable mmc_rescan<br />
Call trace:<br />
add_dma_entry+0x234/0x2f4<br />
debug_dma_map_sg+0x198/0x350<br />
__dma_map_sg_attrs+0xa0/0x110<br />
dma_map_sg_attrs+0x10/0x2c<br />
sdmmc_idma_prep_data+0x80/0xc0<br />
mmci_prep_data+0x38/0x84<br />
mmci_start_data+0x108/0x2dc<br />
mmci_request+0xe4/0x190<br />
__mmc_start_request+0x68/0x140<br />
mmc_start_request+0x94/0xc0<br />
mmc_wait_for_req+0x70/0x100<br />
mmc_send_tuning+0x108/0x1ac<br />
sdmmc_execute_tuning+0x14c/0x210<br />
mmc_execute_tuning+0x48/0xec<br />
mmc_sd_init_uhs_card.part.0+0x208/0x464<br />
mmc_sd_init_card+0x318/0x89c<br />
mmc_attach_sd+0xe4/0x180<br />
mmc_rescan+0x244/0x320<br />
<br />
DMA API debug brings to light leaking dma-mappings as dma_map_sg and<br />
dma_unmap_sg are not correctly balanced.<br />
<br />
If an error occurs in mmci_cmd_irq function, only mmci_dma_error<br />
function is called and as this API is not managed on stm32 variant,<br />
dma_unmap_sg is never called in this error path.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.10.213 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.152 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.81 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.21 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0224cbc53ba82b84affa7619b6d1b1a254bc2c53
- https://git.kernel.org/stable/c/176e66269f0de327375fc0ea51c12c2f5a97e4c4
- https://git.kernel.org/stable/c/5ae5060e17a3fc38e54c3e5bd8abd6b1d5bfae7c
- https://git.kernel.org/stable/c/6b1ba3f9040be5efc4396d86c9752cdc564730be
- https://git.kernel.org/stable/c/70af82bb9c897faa25a44e4181f36c60312b71ef
- https://git.kernel.org/stable/c/d610a307225951929b9dff807788439454476f85
- https://git.kernel.org/stable/c/0224cbc53ba82b84affa7619b6d1b1a254bc2c53
- https://git.kernel.org/stable/c/176e66269f0de327375fc0ea51c12c2f5a97e4c4
- https://git.kernel.org/stable/c/5ae5060e17a3fc38e54c3e5bd8abd6b1d5bfae7c
- https://git.kernel.org/stable/c/6b1ba3f9040be5efc4396d86c9752cdc564730be
- https://git.kernel.org/stable/c/70af82bb9c897faa25a44e4181f36c60312b71ef
- https://git.kernel.org/stable/c/d610a307225951929b9dff807788439454476f85
- https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html



