๐Ÿ” CVE Alert

CVE-2024-53127

UNKNOWN 0.0

Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K"

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" The commit 8396c793ffdf ("mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K") increased the max_req_size, even for 4K pages, causing various issues: - Panic booting the kernel/rootfs from an SD card on Rockchip RK3566 - Panic booting the kernel/rootfs from an SD card on StarFive JH7100 - "swiotlb buffer is full" and data corruption on StarFive JH7110 At this stage no fix have been found, so it's probably better to just revert the change. This reverts commit 8396c793ffdf28bb8aee7cfe0891080f8cab7890.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 4, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
32bd402f6760d57127d58a9888553b2db574bba6 < 00bff71745bc3583bd5ca59be91e0ee1d27f1944 b9ee16a20d9976686185d7e59cd006c328b6a1e0 < 47693ba35bccaa16efa465159a1c12d78258349e 2793f423893579b35dc1fc24dd7c1ce58fa0345a < 938c13740f8b555986e53c0fcbaf00dcd1fabd4c 9d715a234dd8f01af970b78ae2144a2fd3ead21c < f701eb601470bfc0a551913ce5f6ebaa770f0ce0 373f8f5b087f010dddae3306a79c6fdd5c2f8953 < 8f9416147d7ed414109d3501f1cb3d7a1735b25a 5b4bf3948875064a9adcda4b52b59e0520a8c576 < 56de724c58c07a7ca3aac027cfd2ccb184ed9e4e 8396c793ffdf28bb8aee7cfe0891080f8cab7890 < a4685366f07448420badb710ff5c12aaaadf63ad 8396c793ffdf28bb8aee7cfe0891080f8cab7890 < 1635e407a4a64d08a8517ac59ca14ad4fc785e75 5b1ef10f7d49f3320b0faa894204259e590ce588
Linux / Linux
6.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/00bff71745bc3583bd5ca59be91e0ee1d27f1944 git.kernel.org: https://git.kernel.org/stable/c/47693ba35bccaa16efa465159a1c12d78258349e git.kernel.org: https://git.kernel.org/stable/c/938c13740f8b555986e53c0fcbaf00dcd1fabd4c git.kernel.org: https://git.kernel.org/stable/c/f701eb601470bfc0a551913ce5f6ebaa770f0ce0 git.kernel.org: https://git.kernel.org/stable/c/8f9416147d7ed414109d3501f1cb3d7a1735b25a git.kernel.org: https://git.kernel.org/stable/c/56de724c58c07a7ca3aac027cfd2ccb184ed9e4e git.kernel.org: https://git.kernel.org/stable/c/a4685366f07448420badb710ff5c12aaaadf63ad git.kernel.org: https://git.kernel.org/stable/c/1635e407a4a64d08a8517ac59ca14ad4fc785e75 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html