THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-26787

mmc: mmci: stm32: fix DMA API overlapping mappings warning

AssignerLinux
Reserved2024-02-19
Published2024-04-04
Updated2024-05-29

Description

In the Linux kernel, the following vulnerability has been resolved: mmc: mmci: stm32: fix DMA API overlapping mappings warning Turning on CONFIG_DMA_API_DEBUG_SG results in the following warning: DMA-API: mmci-pl18x 48220000.mmc: cacheline tracking EEXIST, overlapping mappings aren't supported WARNING: CPU: 1 PID: 51 at kernel/dma/debug.c:568 add_dma_entry+0x234/0x2f4 Modules linked in: CPU: 1 PID: 51 Comm: kworker/1:2 Not tainted 6.1.28 #1 Hardware name: STMicroelectronics STM32MP257F-EV1 Evaluation Board (DT) Workqueue: events_freezable mmc_rescan Call trace: add_dma_entry+0x234/0x2f4 debug_dma_map_sg+0x198/0x350 __dma_map_sg_attrs+0xa0/0x110 dma_map_sg_attrs+0x10/0x2c sdmmc_idma_prep_data+0x80/0xc0 mmci_prep_data+0x38/0x84 mmci_start_data+0x108/0x2dc mmci_request+0xe4/0x190 __mmc_start_request+0x68/0x140 mmc_start_request+0x94/0xc0 mmc_wait_for_req+0x70/0x100 mmc_send_tuning+0x108/0x1ac sdmmc_execute_tuning+0x14c/0x210 mmc_execute_tuning+0x48/0xec mmc_sd_init_uhs_card.part.0+0x208/0x464 mmc_sd_init_card+0x318/0x89c mmc_attach_sd+0xe4/0x180 mmc_rescan+0x244/0x320 DMA API debug brings to light leaking dma-mappings as dma_map_sg and dma_unmap_sg are not correctly balanced. If an error occurs in mmci_cmd_irq function, only mmci_dma_error function is called and as this API is not managed on stm32 variant, dma_unmap_sg is never called in this error path.

Product status

Default status
unaffected

46b723dd867d before 0224cbc53ba8
affected

46b723dd867d before 5ae5060e17a3
affected

46b723dd867d before 70af82bb9c89
affected

46b723dd867d before 176e66269f0d
affected

46b723dd867d before d610a3072259
affected

46b723dd867d before 6b1ba3f9040b
affected

Default status
affected

4.20
affected

Any version before 4.20
unaffected

5.10.213
unaffected

5.15.152
unaffected

6.1.81
unaffected

6.6.21
unaffected

6.7.9
unaffected

6.8
unaffected

References

https://git.kernel.org/stable/c/0224cbc53ba82b84affa7619b6d1b1a254bc2c53

https://git.kernel.org/stable/c/5ae5060e17a3fc38e54c3e5bd8abd6b1d5bfae7c

https://git.kernel.org/stable/c/70af82bb9c897faa25a44e4181f36c60312b71ef

https://git.kernel.org/stable/c/176e66269f0de327375fc0ea51c12c2f5a97e4c4

https://git.kernel.org/stable/c/d610a307225951929b9dff807788439454476f85

https://git.kernel.org/stable/c/6b1ba3f9040be5efc4396d86c9752cdc564730be

https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html

cve.org CVE-2024-26787

nvd.nist.gov CVE-2024-26787

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-26787
© Copyright 2024 THREATINT. Made in Cyprus with +