CVE-2025-39907 (GCVE-0-2025-39907)
Vulnerability from cvelistv5
Published
2025-10-01 07:44
Modified
2025-10-02 13:26
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer Avoid below overlapping mappings by using a contiguous non-cacheable buffer. [ 4.077708] DMA-API: stm32_fmc2_nfc 48810000.nand-controller: cacheline tracking EEXIST, overlapping mappings aren't supported [ 4.089103] WARNING: CPU: 1 PID: 44 at kernel/dma/debug.c:568 add_dma_entry+0x23c/0x300 [ 4.097071] Modules linked in: [ 4.100101] CPU: 1 PID: 44 Comm: kworker/u4:2 Not tainted 6.1.82 #1 [ 4.106346] Hardware name: STMicroelectronics STM32MP257F VALID1 SNOR / MB1704 (LPDDR4 Power discrete) + MB1703 + MB1708 (SNOR MB1730) (DT) [ 4.118824] Workqueue: events_unbound deferred_probe_work_func [ 4.124674] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 4.131624] pc : add_dma_entry+0x23c/0x300 [ 4.135658] lr : add_dma_entry+0x23c/0x300 [ 4.139792] sp : ffff800009dbb490 [ 4.143016] x29: ffff800009dbb4a0 x28: 0000000004008022 x27: ffff8000098a6000 [ 4.150174] x26: 0000000000000000 x25: ffff8000099e7000 x24: ffff8000099e7de8 [ 4.157231] x23: 00000000ffffffff x22: 0000000000000000 x21: ffff8000098a6a20 [ 4.164388] x20: ffff000080964180 x19: ffff800009819ba0 x18: 0000000000000006 [ 4.171545] x17: 6361727420656e69 x16: 6c6568636163203a x15: 72656c6c6f72746e [ 4.178602] x14: 6f632d646e616e2e x13: ffff800009832f58 x12: 00000000000004ec [ 4.185759] x11: 00000000000001a4 x10: ffff80000988af58 x9 : ffff800009832f58 [ 4.192916] x8 : 00000000ffffefff x7 : ffff80000988af58 x6 : 80000000fffff000 [ 4.199972] x5 : 000000000000bff4 x4 : 0000000000000000 x3 : 0000000000000000 [ 4.207128] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000812d2c40 [ 4.214185] Call trace: [ 4.216605] add_dma_entry+0x23c/0x300 [ 4.220338] debug_dma_map_sg+0x198/0x350 [ 4.224373] __dma_map_sg_attrs+0xa0/0x110 [ 4.228411] dma_map_sg_attrs+0x10/0x2c [ 4.232247] stm32_fmc2_nfc_xfer.isra.0+0x1c8/0x3fc [ 4.237088] stm32_fmc2_nfc_seq_read_page+0xc8/0x174 [ 4.242127] nand_read_oob+0x1d4/0x8e0 [ 4.245861] mtd_read_oob_std+0x58/0x84 [ 4.249596] mtd_read_oob+0x90/0x150 [ 4.253231] mtd_read+0x68/0xac
Impacted products
Vendor Product Version
Linux Linux Version: 2cd457f328c100bc98e36d55fe210e9ab067c704
Version: 2cd457f328c100bc98e36d55fe210e9ab067c704
Version: 2cd457f328c100bc98e36d55fe210e9ab067c704
Version: 2cd457f328c100bc98e36d55fe210e9ab067c704
Version: 2cd457f328c100bc98e36d55fe210e9ab067c704
Version: 2cd457f328c100bc98e36d55fe210e9ab067c704
Version: 2cd457f328c100bc98e36d55fe210e9ab067c704
Version: 2cd457f328c100bc98e36d55fe210e9ab067c704
Create a notification for this product.
   Linux Linux Version: 5.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/mtd/nand/raw/stm32_fmc2_nand.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "dc1c6e60993b93b87604eb11266ac72e1a3be9e0",
              "status": "affected",
              "version": "2cd457f328c100bc98e36d55fe210e9ab067c704",
              "versionType": "git"
            },
            {
              "lessThan": "dfe2ac47a6ee0ab50393694517c54ef1e276dda3",
              "status": "affected",
              "version": "2cd457f328c100bc98e36d55fe210e9ab067c704",
              "versionType": "git"
            },
            {
              "lessThan": "e32a2ea52b51368774d014e5bcd9b86110a2b727",
              "status": "affected",
              "version": "2cd457f328c100bc98e36d55fe210e9ab067c704",
              "versionType": "git"
            },
            {
              "lessThan": "75686c49574dd5f171ca682c18717787f1d8d55e",
              "status": "affected",
              "version": "2cd457f328c100bc98e36d55fe210e9ab067c704",
              "versionType": "git"
            },
            {
              "lessThan": "06d8ef8f853752fea88c8d5bb093a40e71b330cf",
              "status": "affected",
              "version": "2cd457f328c100bc98e36d55fe210e9ab067c704",
              "versionType": "git"
            },
            {
              "lessThan": "26adba1e7d7924174e15a3ba4b1132990786300b",
              "status": "affected",
              "version": "2cd457f328c100bc98e36d55fe210e9ab067c704",
              "versionType": "git"
            },
            {
              "lessThan": "f6fd98d961fa6f97347cead4f08ed862cbbb91ff",
              "status": "affected",
              "version": "2cd457f328c100bc98e36d55fe210e9ab067c704",
              "versionType": "git"
            },
            {
              "lessThan": "513c40e59d5a414ab763a9c84797534b5e8c208d",
              "status": "affected",
              "version": "2cd457f328c100bc98e36d55fe210e9ab067c704",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/mtd/nand/raw/stm32_fmc2_nand.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.1"
            },
            {
              "lessThan": "5.1",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.300",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.245",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.194",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.153",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.107",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.48",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.16.*",
              "status": "unaffected",
              "version": "6.16.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.17",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.300",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.245",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.194",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.153",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.107",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.48",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.16.8",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.17",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer\n\nAvoid below overlapping mappings by using a contiguous\nnon-cacheable buffer.\n\n[    4.077708] DMA-API: stm32_fmc2_nfc 48810000.nand-controller: cacheline tracking EEXIST,\noverlapping mappings aren\u0027t supported\n[    4.089103] WARNING: CPU: 1 PID: 44 at kernel/dma/debug.c:568 add_dma_entry+0x23c/0x300\n[    4.097071] Modules linked in:\n[    4.100101] CPU: 1 PID: 44 Comm: kworker/u4:2 Not tainted 6.1.82 #1\n[    4.106346] Hardware name: STMicroelectronics STM32MP257F VALID1 SNOR / MB1704 (LPDDR4 Power discrete) + MB1703 + MB1708 (SNOR MB1730) (DT)\n[    4.118824] Workqueue: events_unbound deferred_probe_work_func\n[    4.124674] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[    4.131624] pc : add_dma_entry+0x23c/0x300\n[    4.135658] lr : add_dma_entry+0x23c/0x300\n[    4.139792] sp : ffff800009dbb490\n[    4.143016] x29: ffff800009dbb4a0 x28: 0000000004008022 x27: ffff8000098a6000\n[    4.150174] x26: 0000000000000000 x25: ffff8000099e7000 x24: ffff8000099e7de8\n[    4.157231] x23: 00000000ffffffff x22: 0000000000000000 x21: ffff8000098a6a20\n[    4.164388] x20: ffff000080964180 x19: ffff800009819ba0 x18: 0000000000000006\n[    4.171545] x17: 6361727420656e69 x16: 6c6568636163203a x15: 72656c6c6f72746e\n[    4.178602] x14: 6f632d646e616e2e x13: ffff800009832f58 x12: 00000000000004ec\n[    4.185759] x11: 00000000000001a4 x10: ffff80000988af58 x9 : ffff800009832f58\n[    4.192916] x8 : 00000000ffffefff x7 : ffff80000988af58 x6 : 80000000fffff000\n[    4.199972] x5 : 000000000000bff4 x4 : 0000000000000000 x3 : 0000000000000000\n[    4.207128] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000812d2c40\n[    4.214185] Call trace:\n[    4.216605]  add_dma_entry+0x23c/0x300\n[    4.220338]  debug_dma_map_sg+0x198/0x350\n[    4.224373]  __dma_map_sg_attrs+0xa0/0x110\n[    4.228411]  dma_map_sg_attrs+0x10/0x2c\n[    4.232247]  stm32_fmc2_nfc_xfer.isra.0+0x1c8/0x3fc\n[    4.237088]  stm32_fmc2_nfc_seq_read_page+0xc8/0x174\n[    4.242127]  nand_read_oob+0x1d4/0x8e0\n[    4.245861]  mtd_read_oob_std+0x58/0x84\n[    4.249596]  mtd_read_oob+0x90/0x150\n[    4.253231]  mtd_read+0x68/0xac"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-02T13:26:38.328Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/dc1c6e60993b93b87604eb11266ac72e1a3be9e0"
        },
        {
          "url": "https://git.kernel.org/stable/c/dfe2ac47a6ee0ab50393694517c54ef1e276dda3"
        },
        {
          "url": "https://git.kernel.org/stable/c/e32a2ea52b51368774d014e5bcd9b86110a2b727"
        },
        {
          "url": "https://git.kernel.org/stable/c/75686c49574dd5f171ca682c18717787f1d8d55e"
        },
        {
          "url": "https://git.kernel.org/stable/c/06d8ef8f853752fea88c8d5bb093a40e71b330cf"
        },
        {
          "url": "https://git.kernel.org/stable/c/26adba1e7d7924174e15a3ba4b1132990786300b"
        },
        {
          "url": "https://git.kernel.org/stable/c/f6fd98d961fa6f97347cead4f08ed862cbbb91ff"
        },
        {
          "url": "https://git.kernel.org/stable/c/513c40e59d5a414ab763a9c84797534b5e8c208d"
        }
      ],
      "title": "mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-39907",
    "datePublished": "2025-10-01T07:44:30.864Z",
    "dateReserved": "2025-04-16T07:20:57.146Z",
    "dateUpdated": "2025-10-02T13:26:38.328Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-39907\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-10-01T08:15:33.603\",\"lastModified\":\"2025-10-02T19:12:17.160\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer\\n\\nAvoid below overlapping mappings by using a contiguous\\nnon-cacheable buffer.\\n\\n[    4.077708] DMA-API: stm32_fmc2_nfc 48810000.nand-controller: cacheline tracking EEXIST,\\noverlapping mappings aren\u0027t supported\\n[    4.089103] WARNING: CPU: 1 PID: 44 at kernel/dma/debug.c:568 add_dma_entry+0x23c/0x300\\n[    4.097071] Modules linked in:\\n[    4.100101] CPU: 1 PID: 44 Comm: kworker/u4:2 Not tainted 6.1.82 #1\\n[    4.106346] Hardware name: STMicroelectronics STM32MP257F VALID1 SNOR / MB1704 (LPDDR4 Power discrete) + MB1703 + MB1708 (SNOR MB1730) (DT)\\n[    4.118824] Workqueue: events_unbound deferred_probe_work_func\\n[    4.124674] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\\n[    4.131624] pc : add_dma_entry+0x23c/0x300\\n[    4.135658] lr : add_dma_entry+0x23c/0x300\\n[    4.139792] sp : ffff800009dbb490\\n[    4.143016] x29: ffff800009dbb4a0 x28: 0000000004008022 x27: ffff8000098a6000\\n[    4.150174] x26: 0000000000000000 x25: ffff8000099e7000 x24: ffff8000099e7de8\\n[    4.157231] x23: 00000000ffffffff x22: 0000000000000000 x21: ffff8000098a6a20\\n[    4.164388] x20: ffff000080964180 x19: ffff800009819ba0 x18: 0000000000000006\\n[    4.171545] x17: 6361727420656e69 x16: 6c6568636163203a x15: 72656c6c6f72746e\\n[    4.178602] x14: 6f632d646e616e2e x13: ffff800009832f58 x12: 00000000000004ec\\n[    4.185759] x11: 00000000000001a4 x10: ffff80000988af58 x9 : ffff800009832f58\\n[    4.192916] x8 : 00000000ffffefff x7 : ffff80000988af58 x6 : 80000000fffff000\\n[    4.199972] x5 : 000000000000bff4 x4 : 0000000000000000 x3 : 0000000000000000\\n[    4.207128] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000812d2c40\\n[    4.214185] Call trace:\\n[    4.216605]  add_dma_entry+0x23c/0x300\\n[    4.220338]  debug_dma_map_sg+0x198/0x350\\n[    4.224373]  __dma_map_sg_attrs+0xa0/0x110\\n[    4.228411]  dma_map_sg_attrs+0x10/0x2c\\n[    4.232247]  stm32_fmc2_nfc_xfer.isra.0+0x1c8/0x3fc\\n[    4.237088]  stm32_fmc2_nfc_seq_read_page+0xc8/0x174\\n[    4.242127]  nand_read_oob+0x1d4/0x8e0\\n[    4.245861]  mtd_read_oob_std+0x58/0x84\\n[    4.249596]  mtd_read_oob+0x90/0x150\\n[    4.253231]  mtd_read+0x68/0xac\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/06d8ef8f853752fea88c8d5bb093a40e71b330cf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/26adba1e7d7924174e15a3ba4b1132990786300b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/513c40e59d5a414ab763a9c84797534b5e8c208d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/75686c49574dd5f171ca682c18717787f1d8d55e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/dc1c6e60993b93b87604eb11266ac72e1a3be9e0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/dfe2ac47a6ee0ab50393694517c54ef1e276dda3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e32a2ea52b51368774d014e5bcd9b86110a2b727\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f6fd98d961fa6f97347cead4f08ed862cbbb91ff\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…