CVE-2025-39907

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/10/2025
Last modified:
16/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer<br /> <br /> Avoid below overlapping mappings by using a contiguous<br /> non-cacheable buffer.<br /> <br /> [ 4.077708] DMA-API: stm32_fmc2_nfc 48810000.nand-controller: cacheline tracking EEXIST,<br /> overlapping mappings aren&amp;#39;t supported<br /> [ 4.089103] WARNING: CPU: 1 PID: 44 at kernel/dma/debug.c:568 add_dma_entry+0x23c/0x300<br /> [ 4.097071] Modules linked in:<br /> [ 4.100101] CPU: 1 PID: 44 Comm: kworker/u4:2 Not tainted 6.1.82 #1<br /> [ 4.106346] Hardware name: STMicroelectronics STM32MP257F VALID1 SNOR / MB1704 (LPDDR4 Power discrete) + MB1703 + MB1708 (SNOR MB1730) (DT)<br /> [ 4.118824] Workqueue: events_unbound deferred_probe_work_func<br /> [ 4.124674] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br /> [ 4.131624] pc : add_dma_entry+0x23c/0x300<br /> [ 4.135658] lr : add_dma_entry+0x23c/0x300<br /> [ 4.139792] sp : ffff800009dbb490<br /> [ 4.143016] x29: ffff800009dbb4a0 x28: 0000000004008022 x27: ffff8000098a6000<br /> [ 4.150174] x26: 0000000000000000 x25: ffff8000099e7000 x24: ffff8000099e7de8<br /> [ 4.157231] x23: 00000000ffffffff x22: 0000000000000000 x21: ffff8000098a6a20<br /> [ 4.164388] x20: ffff000080964180 x19: ffff800009819ba0 x18: 0000000000000006<br /> [ 4.171545] x17: 6361727420656e69 x16: 6c6568636163203a x15: 72656c6c6f72746e<br /> [ 4.178602] x14: 6f632d646e616e2e x13: ffff800009832f58 x12: 00000000000004ec<br /> [ 4.185759] x11: 00000000000001a4 x10: ffff80000988af58 x9 : ffff800009832f58<br /> [ 4.192916] x8 : 00000000ffffefff x7 : ffff80000988af58 x6 : 80000000fffff000<br /> [ 4.199972] x5 : 000000000000bff4 x4 : 0000000000000000 x3 : 0000000000000000<br /> [ 4.207128] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000812d2c40<br /> [ 4.214185] Call trace:<br /> [ 4.216605] add_dma_entry+0x23c/0x300<br /> [ 4.220338] debug_dma_map_sg+0x198/0x350<br /> [ 4.224373] __dma_map_sg_attrs+0xa0/0x110<br /> [ 4.228411] dma_map_sg_attrs+0x10/0x2c<br /> [ 4.232247] stm32_fmc2_nfc_xfer.isra.0+0x1c8/0x3fc<br /> [ 4.237088] stm32_fmc2_nfc_seq_read_page+0xc8/0x174<br /> [ 4.242127] nand_read_oob+0x1d4/0x8e0<br /> [ 4.245861] mtd_read_oob_std+0x58/0x84<br /> [ 4.249596] mtd_read_oob+0x90/0x150<br /> [ 4.253231] mtd_read+0x68/0xac

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.1 (including) 5.4.300 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.245 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.194 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.153 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.107 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.48 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.16.8 (excluding)
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc5:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*