We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-53127

Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K"



Description

In the Linux kernel, the following vulnerability has been resolved: Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" The commit 8396c793ffdf ("mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K") increased the max_req_size, even for 4K pages, causing various issues: - Panic booting the kernel/rootfs from an SD card on Rockchip RK3566 - Panic booting the kernel/rootfs from an SD card on StarFive JH7100 - "swiotlb buffer is full" and data corruption on StarFive JH7110 At this stage no fix have been found, so it's probably better to just revert the change. This reverts commit 8396c793ffdf28bb8aee7cfe0891080f8cab7890.

Reserved 2024-11-19 | Published 2024-12-04 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

32bd402f6760d57127d58a9888553b2db574bba6 before 00bff71745bc3583bd5ca59be91e0ee1d27f1944
affected

b9ee16a20d9976686185d7e59cd006c328b6a1e0 before 47693ba35bccaa16efa465159a1c12d78258349e
affected

2793f423893579b35dc1fc24dd7c1ce58fa0345a before 938c13740f8b555986e53c0fcbaf00dcd1fabd4c
affected

9d715a234dd8f01af970b78ae2144a2fd3ead21c before f701eb601470bfc0a551913ce5f6ebaa770f0ce0
affected

373f8f5b087f010dddae3306a79c6fdd5c2f8953 before 8f9416147d7ed414109d3501f1cb3d7a1735b25a
affected

5b4bf3948875064a9adcda4b52b59e0520a8c576 before 56de724c58c07a7ca3aac027cfd2ccb184ed9e4e
affected

8396c793ffdf28bb8aee7cfe0891080f8cab7890 before a4685366f07448420badb710ff5c12aaaadf63ad
affected

8396c793ffdf28bb8aee7cfe0891080f8cab7890 before 1635e407a4a64d08a8517ac59ca14ad4fc785e75
affected

Default status
affected

6.11
affected

Any version before 6.11
unaffected

4.19.325
unaffected

5.4.287
unaffected

5.10.231
unaffected

5.15.174
unaffected

6.1.119
unaffected

6.6.63
unaffected

6.11.10
unaffected

6.12
unaffected

References

git.kernel.org/...c/00bff71745bc3583bd5ca59be91e0ee1d27f1944

git.kernel.org/...c/47693ba35bccaa16efa465159a1c12d78258349e

git.kernel.org/...c/938c13740f8b555986e53c0fcbaf00dcd1fabd4c

git.kernel.org/...c/f701eb601470bfc0a551913ce5f6ebaa770f0ce0

git.kernel.org/...c/8f9416147d7ed414109d3501f1cb3d7a1735b25a

git.kernel.org/...c/56de724c58c07a7ca3aac027cfd2ccb184ed9e4e

git.kernel.org/...c/a4685366f07448420badb710ff5c12aaaadf63ad

git.kernel.org/...c/1635e407a4a64d08a8517ac59ca14ad4fc785e75

cve.org (CVE-2024-53127)

nvd.nist.gov (CVE-2024-53127)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-53127

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.