๐Ÿ” CVE Alert

CVE-2025-39869

UNKNOWN 0.0

dmaengine: ti: edma: Fix memory allocation size for queue_priority_map

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: edma: Fix memory allocation size for queue_priority_map Fix a critical memory allocation bug in edma_setup_from_hw() where queue_priority_map was allocated with insufficient memory. The code declared queue_priority_map as s8 (*)[2] (pointer to array of 2 s8), but allocated memory using sizeof(s8) instead of the correct size. This caused out-of-bounds memory writes when accessing: queue_priority_map[i][0] = i; queue_priority_map[i][1] = i; The bug manifested as kernel crashes with "Oops - undefined instruction" on ARM platforms (BeagleBoard-X15) during EDMA driver probe, as the memory corruption triggered kernel hardening features on Clang. Change the allocation to use sizeof(*queue_priority_map) which automatically gets the correct size for the 2D array structure.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 23, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
2b6b3b7420190888793c49e97276e1e73bd7eaed < 7d4de60d6db02d9b01d5890d5156b04fad65d07a 2b6b3b7420190888793c49e97276e1e73bd7eaed < d722de80ce037dccf6931e778f4a46499d51bdf9 2b6b3b7420190888793c49e97276e1e73bd7eaed < 301a96cc4dc006c9a285913d301e681cfbf7edb6 2b6b3b7420190888793c49e97276e1e73bd7eaed < 5e462fa0dfdb52b3983cf41532d3d4c7d63e2f93 2b6b3b7420190888793c49e97276e1e73bd7eaed < 1baed10553fc8b388351d8fc803e3ae6f1a863bc 2b6b3b7420190888793c49e97276e1e73bd7eaed < 069fd1688c57c0cc8a3de64d108579b31676f74b 2b6b3b7420190888793c49e97276e1e73bd7eaed < d5e82f3f2c918d446df46e8d65f8083fd97cdec5 2b6b3b7420190888793c49e97276e1e73bd7eaed < e63419dbf2ceb083c1651852209c7f048089ac0f
Linux / Linux
4.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/7d4de60d6db02d9b01d5890d5156b04fad65d07a git.kernel.org: https://git.kernel.org/stable/c/d722de80ce037dccf6931e778f4a46499d51bdf9 git.kernel.org: https://git.kernel.org/stable/c/301a96cc4dc006c9a285913d301e681cfbf7edb6 git.kernel.org: https://git.kernel.org/stable/c/5e462fa0dfdb52b3983cf41532d3d4c7d63e2f93 git.kernel.org: https://git.kernel.org/stable/c/1baed10553fc8b388351d8fc803e3ae6f1a863bc git.kernel.org: https://git.kernel.org/stable/c/069fd1688c57c0cc8a3de64d108579b31676f74b git.kernel.org: https://git.kernel.org/stable/c/d5e82f3f2c918d446df46e8d65f8083fd97cdec5 git.kernel.org: https://git.kernel.org/stable/c/e63419dbf2ceb083c1651852209c7f048089ac0f lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html