CVE-2024-56756
nvme-pci: fix freeing of the HMB descriptor table
CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: nvme-pci: fix freeing of the HMB descriptor table The HMB descriptor table is sized to the maximum number of descriptors that could be used for a given device, but __nvme_alloc_host_mem could break out of the loop earlier on memory allocation failure and end up using less descriptors than planned for, which leads to an incorrect size passed to dma_free_coherent. In practice this was not showing up because the number of descriptors tends to be low and the dma coherent allocator always allocates and frees at least a page.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Dec 29, 2024 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new medium vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
87ad72a59a38d1df217cfd95bc222a2edfe5d399 < ac22240540e0c5230d8c4138e3778420b712716a 87ad72a59a38d1df217cfd95bc222a2edfe5d399 < 452f9ddd12bebc04cef741e8ba3806bf0e1fd015 87ad72a59a38d1df217cfd95bc222a2edfe5d399 < 869cf50b9c9d1059f5223f79ef68fc0bc6210095 87ad72a59a38d1df217cfd95bc222a2edfe5d399 < fb96d5cfa97a7363245b3dd523f475b04296d87b 87ad72a59a38d1df217cfd95bc222a2edfe5d399 < cee3bff51a35cab1c5d842d409a7b11caefe2386 87ad72a59a38d1df217cfd95bc222a2edfe5d399 < 6d0f599db73b099aa724a12736369c4d4d92849d 87ad72a59a38d1df217cfd95bc222a2edfe5d399 < 582d9ed999b004fb1d415ecbfa86d4d8df455269 87ad72a59a38d1df217cfd95bc222a2edfe5d399 < 3c2fb1ca8086eb139b2a551358137525ae8e0d7a
Linux / Linux
4.13
References
git.kernel.org: https://git.kernel.org/stable/c/ac22240540e0c5230d8c4138e3778420b712716a git.kernel.org: https://git.kernel.org/stable/c/452f9ddd12bebc04cef741e8ba3806bf0e1fd015 git.kernel.org: https://git.kernel.org/stable/c/869cf50b9c9d1059f5223f79ef68fc0bc6210095 git.kernel.org: https://git.kernel.org/stable/c/fb96d5cfa97a7363245b3dd523f475b04296d87b git.kernel.org: https://git.kernel.org/stable/c/cee3bff51a35cab1c5d842d409a7b11caefe2386 git.kernel.org: https://git.kernel.org/stable/c/6d0f599db73b099aa724a12736369c4d4d92849d git.kernel.org: https://git.kernel.org/stable/c/582d9ed999b004fb1d415ecbfa86d4d8df455269 git.kernel.org: https://git.kernel.org/stable/c/3c2fb1ca8086eb139b2a551358137525ae8e0d7a lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html