CVE-2024-39484

5.5 MEDIUM
Published: July 05, 2024 Modified: November 03, 2025

Description

In the Linux kernel, the following vulnerability has been resolved: mmc: davinci: Don't strip remove function when driver is builtin Using __exit for the remove function results in the remove callback being discarded with CONFIG_MMC_DAVINCI=y. When such a device gets unbound (e.g. using sysfs or hotplug), the driver is just removed without the cleanup being performed. This results in resource leaks. Fix it by compiling in the remove callback unconditionally. This also fixes a W=1 modpost warning: WARNING: modpost: drivers/mmc/host/davinci_mmc: section mismatch in reference: davinci_mmcsd_driver+0x10 (section: .data) -> davinci_mmcsd_remove (section: .exit.text)

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://git.kernel.org/stable/c/1d5ed0efe51d36b9ae9b64f133bf41cdbf56f584
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/55c421b364482b61c4c45313a535e61ed5ae4ea3
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/5ee241f72edc6dce5051a5f100eab6cc019d873e
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/6ff7cfa02baabec907f6f29ea76634e6256d2ec4
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/7590da4c04dd4aa9c262da0231e978263861c6eb
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/aea35157bb9b825faa0432bd0f7fbea37ff39aa1
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/1d5ed0efe51d36b9ae9b64f133bf41cdbf56f584
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
https://git.kernel.org/stable/c/55c421b364482b61c4c45313a535e61ed5ae4ea3
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
https://git.kernel.org/stable/c/5ee241f72edc6dce5051a5f100eab6cc019d873e
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
https://git.kernel.org/stable/c/6ff7cfa02baabec907f6f29ea76634e6256d2ec4
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
https://git.kernel.org/stable/c/7590da4c04dd4aa9c262da0231e978263861c6eb
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
https://git.kernel.org/stable/c/aea35157bb9b825faa0432bd0f7fbea37ff39aa1
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch

13 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.5 / 10.0
EPSS (Exploit Probability)
0.0%
9th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

linux