{"id":"CVE-2024-36029","summary":"mmc: sdhci-msm: pervent access to suspended controller","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdhci-msm: pervent access to suspended controller\n\nGeneric sdhci code registers LED device and uses host-\u003eruntime_suspended\nflag to protect access to it. The sdhci-msm driver doesn't set this flag,\nwhich causes a crash when LED is accessed while controller is runtime\nsuspended. Fix this by setting the flag correctly.","modified":"2026-04-02T11:59:58.659554Z","published":"2024-05-30T15:19:43.110Z","related":["MGASA-2024-0263","MGASA-2024-0266","SUSE-SU-2024:1979-1","SUSE-SU-2024:1983-1","SUSE-SU-2024:2008-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2135-1","SUSE-SU-2024:2184-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2203-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20249-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/36xxx/CVE-2024-36029.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1200481cd6069d16ce20133bcd86f5825e26a045"},{"type":"WEB","url":"https://git.kernel.org/stable/c/56b99a52229d7f8cd1f53d899f57aa7eb4b199af"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a957ea5aa3d3518067a1ba32c6127322ad348d20"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f653b04a818c490b045c97834d559911479aa1c5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f8def10f73a516b771051a2f70f2f0446902cb4f"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/36xxx/CVE-2024-36029.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36029"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"67e6db113c903f2b8af924400b7b43ade4b9ac5c"},{"fixed":"1200481cd6069d16ce20133bcd86f5825e26a045"},{"fixed":"a957ea5aa3d3518067a1ba32c6127322ad348d20"},{"fixed":"56b99a52229d7f8cd1f53d899f57aa7eb4b199af"},{"fixed":"f653b04a818c490b045c97834d559911479aa1c5"},{"fixed":"f8def10f73a516b771051a2f70f2f0446902cb4f"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36029.json"}}],"schema_version":"1.7.5"}