๐Ÿ” CVE Alert

CVE-2024-56719

MEDIUM 5.5

net: stmmac: fix TSO DMA API usage causing oops

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net: stmmac: fix TSO DMA API usage causing oops Commit 66600fac7a98 ("net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data") moved the assignment of tx_skbuff_dma[]'s members to be later in stmmac_tso_xmit(). The buf (dma cookie) and len stored in this structure are passed to dma_unmap_single() by stmmac_tx_clean(). The DMA API requires that the dma cookie passed to dma_unmap_single() is the same as the value returned from dma_map_single(). However, by moving the assignment later, this is not the case when priv->dma_cap.addr64 > 32 as "des" is offset by proto_hdr_len. This causes problems such as: dwc-eth-dwmac 2490000.ethernet eth0: Tx DMA map failed and with DMA_API_DEBUG enabled: DMA-API: dwc-eth-dwmac 2490000.ethernet: device driver tries to +free DMA memory it has not allocated [device address=0x000000ffffcf65c0] [size=66 bytes] Fix this by maintaining "des" as the original DMA cookie, and use tso_des to pass the offset DMA cookie to stmmac_tso_allocator(). Full details of the crashes can be found at: https://lore.kernel.org/all/[email protected]/ https://lore.kernel.org/all/klkzp5yn5kq5efgtrow6wbvnc46bcqfxs65nz3qy77ujr5turc@bwwhelz2l4dw/

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 29, 2024
Last Updated Mar 25, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
a3ff23f7c3f0e13f718900803e090fd3997d6bc9 < 6abcdc9a73274052a9e96a1926994ecf9aedad82 07c9c26e37542486e34d767505e842f48f29c3f6 < db3667c9bbfbbf5de98e6c9542f7e03fb5243286 66600fac7a984dea4ae095411f644770b2561ede < 9d5dd7ccea1b46a9a7c6b3c2b9e5ed8864e185e2 66600fac7a984dea4ae095411f644770b2561ede < 4c49f38e20a57f8abaebdf95b369295b153d1f8e ece593fc9c00741b682869d3f3dc584d37b7c9df 58d23d835eb498336716cca55b5714191a309286
Linux / Linux
6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/6abcdc9a73274052a9e96a1926994ecf9aedad82 git.kernel.org: https://git.kernel.org/stable/c/db3667c9bbfbbf5de98e6c9542f7e03fb5243286 git.kernel.org: https://git.kernel.org/stable/c/9d5dd7ccea1b46a9a7c6b3c2b9e5ed8864e185e2 git.kernel.org: https://git.kernel.org/stable/c/4c49f38e20a57f8abaebdf95b369295b153d1f8e