{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-50295","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-10-21T19:36:19.986Z","datePublished":"2024-11-19T01:30:41.999Z","dateUpdated":"2025-11-03T22:28:13.813Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T13:00:11.754Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: arc: fix the device for dma_map_single/dma_unmap_single\n\nThe ndev->dev and pdev->dev aren't the same device, use ndev->dev.parent\nwhich has dma_mask, ndev->dev.parent is just pdev->dev.\nOr it would cause the following issue:\n\n[   39.933526] ------------[ cut here ]------------\n[   39.938414] WARNING: CPU: 1 PID: 501 at kernel/dma/mapping.c:149 dma_map_page_attrs+0x90/0x1f8"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/arc/emac_main.c"],"versions":[{"version":"f959dcd6ddfd29235030e8026471ac1b022ad2b0","lessThan":"30606ea3fae57f8e9f2467415389e988e3c53a18","status":"affected","versionType":"git"},{"version":"f959dcd6ddfd29235030e8026471ac1b022ad2b0","lessThan":"3898393b5483c8aa2efd7cb13aa70e22078ab022","status":"affected","versionType":"git"},{"version":"f959dcd6ddfd29235030e8026471ac1b022ad2b0","lessThan":"fd4e062fbc07156f8e9d73212d347c744572677e","status":"affected","versionType":"git"},{"version":"f959dcd6ddfd29235030e8026471ac1b022ad2b0","lessThan":"8ed7a4a39c3f7cd9655af867e878fda512ae67ad","status":"affected","versionType":"git"},{"version":"f959dcd6ddfd29235030e8026471ac1b022ad2b0","lessThan":"cd4706d9ac0d8d3bab8dc9e50cc1187f6cfa43dd","status":"affected","versionType":"git"},{"version":"f959dcd6ddfd29235030e8026471ac1b022ad2b0","lessThan":"71803c1dfa29e0d13b99e48fda11107cc8caebc7","status":"affected","versionType":"git"},{"version":"4e57482e8440fac7137832629109730ea4b267aa","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/arc/emac_main.c"],"versions":[{"version":"5.10","status":"affected"},{"version":"0","lessThan":"5.10","status":"unaffected","versionType":"semver"},{"version":"5.10.230","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.172","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.117","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.61","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.11.8","lessThanOrEqual":"6.11.*","status":"unaffected","versionType":"semver"},{"version":"6.12","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"5.10.230"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"5.15.172"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"6.1.117"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"6.6.61"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"6.11.8"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"6.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/30606ea3fae57f8e9f2467415389e988e3c53a18"},{"url":"https://git.kernel.org/stable/c/3898393b5483c8aa2efd7cb13aa70e22078ab022"},{"url":"https://git.kernel.org/stable/c/fd4e062fbc07156f8e9d73212d347c744572677e"},{"url":"https://git.kernel.org/stable/c/8ed7a4a39c3f7cd9655af867e878fda512ae67ad"},{"url":"https://git.kernel.org/stable/c/cd4706d9ac0d8d3bab8dc9e50cc1187f6cfa43dd"},{"url":"https://git.kernel.org/stable/c/71803c1dfa29e0d13b99e48fda11107cc8caebc7"}],"title":"net: arc: fix the device for dma_map_single/dma_unmap_single","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T22:28:13.813Z"}}]}}