Bug 1227493 (CVE-2024-39484) - VUL-0: CVE-2024-39484: kernel: mmc: davinci: Don't strip remove function when driver is builtin
Summary: VUL-0: CVE-2024-39484: kernel: mmc: davinci: Don't strip remove function when...
Status: NEW
Alias: CVE-2024-39484
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/412895/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-39484:5.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-07-08 09:06 UTC by SMASH SMASH
Modified: 2024-07-08 18:48 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-07-08 09:06:03 UTC
In the Linux kernel, the following vulnerability has been resolved:

mmc: davinci: Don't strip remove function when driver is builtin

Using __exit for the remove function results in the remove callback being
discarded with CONFIG_MMC_DAVINCI=y. When such a device gets unbound (e.g.
using sysfs or hotplug), the driver is just removed without the cleanup
being performed. This results in resource leaks. Fix it by compiling in the
remove callback unconditionally.

This also fixes a W=1 modpost warning:

WARNING: modpost: drivers/mmc/host/davinci_mmc: section mismatch in
reference: davinci_mmcsd_driver+0x10 (section: .data) ->
davinci_mmcsd_remove (section: .exit.text)

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-39484
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-39484.mbox
https://git.kernel.org/stable/c/6ff7cfa02baabec907f6f29ea76634e6256d2ec4
https://git.kernel.org/stable/c/aea35157bb9b825faa0432bd0f7fbea37ff39aa1
https://git.kernel.org/stable/c/5ee241f72edc6dce5051a5f100eab6cc019d873e
https://git.kernel.org/stable/c/7590da4c04dd4aa9c262da0231e978263861c6eb
https://git.kernel.org/stable/c/1d5ed0efe51d36b9ae9b64f133bf41cdbf56f584
https://git.kernel.org/stable/c/55c421b364482b61c4c45313a535e61ed5ae4ea3
https://www.cve.org/CVERecord?id=CVE-2024-39484
https://bugzilla.redhat.com/show_bug.cgi?id=2295922
https://bugzilla.redhat.com/show_bug.cgi?id=2296047