CVE-2025-39869

HIGH

Linux Kernel - Memory Corruption

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: edma: Fix memory allocation size for queue_priority_map Fix a critical memory allocation bug in edma_setup_from_hw() where queue_priority_map was allocated with insufficient memory. The code declared queue_priority_map as s8 (*)[2] (pointer to array of 2 s8), but allocated memory using sizeof(s8) instead of the correct size. This caused out-of-bounds memory writes when accessing: queue_priority_map[i][0] = i; queue_priority_map[i][1] = i; The bug manifested as kernel crashes with "Oops - undefined instruction" on ARM platforms (BeagleBoard-X15) during EDMA driver probe, as the memory corruption triggered kernel hardening features on Clang. Change the allocation to use sizeof(*queue_priority_map) which automatically gets the correct size for the 2D array structure.

Scores

CVSS v3 7.1
EPSS 0.0002
EPSS Percentile 6.5%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Details

CWE
CWE-125
Status published
Products (10)
debian/debian_linux 11.0
linux/Kernel 4.4.0 - 5.4.300linux
linux/Kernel 5.11.0 - 5.15.194linux
linux/Kernel 5.16.0 - 6.1.153linux
linux/Kernel 5.5.0 - 5.10.245linux
linux/Kernel 6.13.0 - 6.16.8linux
linux/Kernel 6.2.0 - 6.6.107linux
linux/Kernel 6.7.0 - 6.12.48linux
linux/linux_kernel 6.17 rc1 (5 CPE variants)
linux/linux_kernel 4.4 - 5.4.300
Published Sep 23, 2025
Tracked Since Feb 18, 2026