In the Linux kernel, the following vulnerability has been resolved: mmc:
mmci: stm32: fix DMA API overlapping mappings warning Turning on
CONFIG_DMA_API_DEBUG_SG results in the following warning: DMA-API:
mmci-pl18x 48220000.mmc: cacheline tracking EEXIST, overlapping mappings
aren’t supported WARNING: CPU: 1 PID: 51 at kernel/dma/debug.c:568
add_dma_entry+0x234/0x2f4 Modules linked in: CPU: 1 PID: 51 Comm:
kworker/1:2 Not tainted 6.1.28 #1 Hardware name: STMicroelectronics
STM32MP257F-EV1 Evaluation Board (DT) Workqueue: events_freezable
mmc_rescan Call trace: add_dma_entry+0x234/0x2f4
debug_dma_map_sg+0x198/0x350 __dma_map_sg_attrs+0xa0/0x110
dma_map_sg_attrs+0x10/0x2c sdmmc_idma_prep_data+0x80/0xc0
mmci_prep_data+0x38/0x84 mmci_start_data+0x108/0x2dc
mmci_request+0xe4/0x190 __mmc_start_request+0x68/0x140
mmc_start_request+0x94/0xc0 mmc_wait_for_req+0x70/0x100
mmc_send_tuning+0x108/0x1ac sdmmc_execute_tuning+0x14c/0x210
mmc_execute_tuning+0x48/0xec mmc_sd_init_uhs_card.part.0+0x208/0x464
mmc_sd_init_card+0x318/0x89c mmc_attach_sd+0xe4/0x180
mmc_rescan+0x244/0x320 DMA API debug brings to light leaking dma-mappings
as dma_map_sg and dma_unmap_sg are not correctly balanced. If an error
occurs in mmci_cmd_irq function, only mmci_dma_error function is called and
as this API is not managed on stm32 variant, dma_unmap_sg is never called
in this error path.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-112.122 | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1063.69 | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1063.69~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < 5.15.0-1066.75 | UNKNOWN |
git.kernel.org/stable/c/0224cbc53ba82b84affa7619b6d1b1a254bc2c53
git.kernel.org/stable/c/176e66269f0de327375fc0ea51c12c2f5a97e4c4
git.kernel.org/stable/c/5ae5060e17a3fc38e54c3e5bd8abd6b1d5bfae7c
git.kernel.org/stable/c/6b1ba3f9040be5efc4396d86c9752cdc564730be
git.kernel.org/stable/c/70af82bb9c897faa25a44e4181f36c60312b71ef
git.kernel.org/stable/c/d610a307225951929b9dff807788439454476f85
launchpad.net/bugs/cve/CVE-2024-26787
nvd.nist.gov/vuln/detail/CVE-2024-26787
security-tracker.debian.org/tracker/CVE-2024-26787
ubuntu.com/security/notices/USN-6820-1
ubuntu.com/security/notices/USN-6820-2
ubuntu.com/security/notices/USN-6821-1
ubuntu.com/security/notices/USN-6821-2
ubuntu.com/security/notices/USN-6821-3
ubuntu.com/security/notices/USN-6821-4
ubuntu.com/security/notices/USN-6828-1
www.cve.org/CVERecord?id=CVE-2024-26787