CVE-2025-22049

In the Linux kernel, the following vulnerability has been resolved: LoongArch: Increase ARCH_DMA_MINALIGN up to 16 ARCH_DMA_MINALIGN is 1 by default, but some LoongArch-specific devices (such as APBDMA) require 16 bytes alignment. When the data buffer length is too small, the hardware may make an error writing cacheline. Thus, it is dangerous to allocate a small memory buffer for DMA. It's always safe to define ARCH_DMA_MINALIGN as L1_CACHE_BYTES but unnecessary (kmalloc() need small memory objects). Therefore, just increase it to 16.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

31 Oct 2025, 20:20

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: LoongArch: Aumentar ARCH_DMA_MINALIGN hasta 16. ARCH_DMA_MINALIGN es 1 por defecto, pero algunos dispositivos específicos de LoongArch (como APBDMA) requieren una alineación de 16 bytes. Cuando la longitud del búfer de datos es demasiado pequeña, el hardware puede cometer un error al escribir la línea de caché. Por lo tanto, es peligroso asignar un búfer de memoria pequeño para DMA. Siempre es seguro definir ARCH_DMA_MINALIGN como L1_CACHE_BYTES, pero no es necesario (kmalloc() requiere objetos de memoria pequeños). Por lo tanto, simplemente auméntelo a 16.
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/1d0def2d1658666ec1f32c9495df60e7411e3c82 - () https://git.kernel.org/stable/c/1d0def2d1658666ec1f32c9495df60e7411e3c82 - Patch
References () https://git.kernel.org/stable/c/279ec25c2df49fba1cd9488f2ddd045d9cb2112e - () https://git.kernel.org/stable/c/279ec25c2df49fba1cd9488f2ddd045d9cb2112e - Patch
References () https://git.kernel.org/stable/c/4103cfe9dcb88010ae4911d3ff417457d1b6a720 - () https://git.kernel.org/stable/c/4103cfe9dcb88010ae4911d3ff417457d1b6a720 - Patch
References () https://git.kernel.org/stable/c/8b82aea3666f8f2c78f86148d78aea99c46e0f82 - () https://git.kernel.org/stable/c/8b82aea3666f8f2c78f86148d78aea99c46e0f82 - Patch
References () https://git.kernel.org/stable/c/bfff341cac7c650e6ca8d10503725992f5564d0f - () https://git.kernel.org/stable/c/bfff341cac7c650e6ca8d10503725992f5564d0f - Patch
References () https://git.kernel.org/stable/c/f39af67f03b564b763b06e44cb960c10a382d54a - () https://git.kernel.org/stable/c/f39af67f03b564b763b06e44cb960c10a382d54a - Patch

16 Apr 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-16 15:15

Updated : 2025-10-31 20:20


NVD link : CVE-2025-22049

Mitre link : CVE-2025-22049

CVE.ORG link : CVE-2025-22049


JSON object : View

Products Affected

linux

  • linux_kernel