{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2024-26787","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-02-19T14:20:24.178Z","datePublished":"2024-04-04T08:20:19.751Z","dateUpdated":"2026-05-12T11:49:26.809Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T20:04:10.919Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: mmci: stm32: fix DMA API overlapping mappings warning\n\nTurning on CONFIG_DMA_API_DEBUG_SG results in the following warning:\n\nDMA-API: mmci-pl18x 48220000.mmc: cacheline tracking EEXIST,\noverlapping mappings aren't supported\nWARNING: CPU: 1 PID: 51 at kernel/dma/debug.c:568\nadd_dma_entry+0x234/0x2f4\nModules linked in:\nCPU: 1 PID: 51 Comm: kworker/1:2 Not tainted 6.1.28 #1\nHardware name: STMicroelectronics STM32MP257F-EV1 Evaluation Board (DT)\nWorkqueue: events_freezable mmc_rescan\nCall trace:\nadd_dma_entry+0x234/0x2f4\ndebug_dma_map_sg+0x198/0x350\n__dma_map_sg_attrs+0xa0/0x110\ndma_map_sg_attrs+0x10/0x2c\nsdmmc_idma_prep_data+0x80/0xc0\nmmci_prep_data+0x38/0x84\nmmci_start_data+0x108/0x2dc\nmmci_request+0xe4/0x190\n__mmc_start_request+0x68/0x140\nmmc_start_request+0x94/0xc0\nmmc_wait_for_req+0x70/0x100\nmmc_send_tuning+0x108/0x1ac\nsdmmc_execute_tuning+0x14c/0x210\nmmc_execute_tuning+0x48/0xec\nmmc_sd_init_uhs_card.part.0+0x208/0x464\nmmc_sd_init_card+0x318/0x89c\nmmc_attach_sd+0xe4/0x180\nmmc_rescan+0x244/0x320\n\nDMA API debug brings to light leaking dma-mappings as dma_map_sg and\ndma_unmap_sg are not correctly balanced.\n\nIf an error occurs in mmci_cmd_irq function, only mmci_dma_error\nfunction is called and as this API is not managed on stm32 variant,\ndma_unmap_sg is never called in this error path."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/mmc/host/mmci_stm32_sdmmc.c"],"versions":[{"version":"46b723dd867d599420fb640c0eaf2a866ef721d4","lessThan":"0224cbc53ba82b84affa7619b6d1b1a254bc2c53","status":"affected","versionType":"git"},{"version":"46b723dd867d599420fb640c0eaf2a866ef721d4","lessThan":"5ae5060e17a3fc38e54c3e5bd8abd6b1d5bfae7c","status":"affected","versionType":"git"},{"version":"46b723dd867d599420fb640c0eaf2a866ef721d4","lessThan":"70af82bb9c897faa25a44e4181f36c60312b71ef","status":"affected","versionType":"git"},{"version":"46b723dd867d599420fb640c0eaf2a866ef721d4","lessThan":"176e66269f0de327375fc0ea51c12c2f5a97e4c4","status":"affected","versionType":"git"},{"version":"46b723dd867d599420fb640c0eaf2a866ef721d4","lessThan":"d610a307225951929b9dff807788439454476f85","status":"affected","versionType":"git"},{"version":"46b723dd867d599420fb640c0eaf2a866ef721d4","lessThan":"6b1ba3f9040be5efc4396d86c9752cdc564730be","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/mmc/host/mmci_stm32_sdmmc.c"],"versions":[{"version":"4.20","status":"affected"},{"version":"0","lessThan":"4.20","status":"unaffected","versionType":"semver"},{"version":"5.10.213","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.152","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.81","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.21","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.7.9","lessThanOrEqual":"6.7.*","status":"unaffected","versionType":"semver"},{"version":"6.8","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"5.10.213"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"5.15.152"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"6.1.81"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"6.6.21"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"6.7.9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"6.8"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/0224cbc53ba82b84affa7619b6d1b1a254bc2c53"},{"url":"https://git.kernel.org/stable/c/5ae5060e17a3fc38e54c3e5bd8abd6b1d5bfae7c"},{"url":"https://git.kernel.org/stable/c/70af82bb9c897faa25a44e4181f36c60312b71ef"},{"url":"https://git.kernel.org/stable/c/176e66269f0de327375fc0ea51c12c2f5a97e4c4"},{"url":"https://git.kernel.org/stable/c/d610a307225951929b9dff807788439454476f85"},{"url":"https://git.kernel.org/stable/c/6b1ba3f9040be5efc4396d86c9752cdc564730be"}],"title":"mmc: mmci: stm32: fix DMA API overlapping mappings warning","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T00:14:13.461Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/0224cbc53ba82b84affa7619b6d1b1a254bc2c53","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/5ae5060e17a3fc38e54c3e5bd8abd6b1d5bfae7c","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/70af82bb9c897faa25a44e4181f36c60312b71ef","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/176e66269f0de327375fc0ea51c12c2f5a97e4c4","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/d610a307225951929b9dff807788439454476f85","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/6b1ba3f9040be5efc4396d86c9752cdc564730be","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-26787","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T15:51:02.092511Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:33:51.566Z"}},{"x_adpType":"supplier","providerMetadata":{"orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP","dateUpdated":"2026-05-12T11:49:26.809Z"},"affected":[{"vendor":"Siemens","product":"SIMATIC S7-1500 TM MFP - GNU/Linux subsystem","versions":[{"status":"affected","version":"0","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html"}]}]},"dataVersion":"5.2"}