First published: Wed Dec 04 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" The commit 8396c793ffdf ("mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K") increased the max_req_size, even for 4K pages, causing various issues: - Panic booting the kernel/rootfs from an SD card on Rockchip RK3566 - Panic booting the kernel/rootfs from an SD card on StarFive JH7100 - "swiotlb buffer is full" and data corruption on StarFive JH7110 At this stage no fix have been found, so it's probably better to just revert the change. This reverts commit 8396c793ffdf28bb8aee7cfe0891080f8cab7890.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=4.19.322<4.20 | |
Linux Kernel | >=6.1.110<6.1.119 | |
Linux Kernel | >=6.6.51<6.6.63 | |
Linux Kernel | >=6.11<6.11.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-53127 is classified as medium due to its potential impact on system stability.
To fix CVE-2024-53127, update the Linux kernel to versions beyond 4.20, 6.1.119, 6.6.63, or 6.11.10.
CVE-2024-53127 affects Linux kernel versions between 4.19.322 and 4.20, 6.1.110 and 6.1.119, 6.6.51 and 6.6.63, and 6.11 and 6.11.10.
CVE-2024-53127 impacts systems running the affected versions of the Linux kernel.
System administrators and users running affected Linux kernel versions should be concerned about CVE-2024-53127.