First published: Wed Apr 16 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: LoongArch: Increase ARCH_DMA_MINALIGN up to 16 ARCH_DMA_MINALIGN is 1 by default, but some LoongArch-specific devices (such as APBDMA) require 16 bytes alignment. When the data buffer length is too small, the hardware may make an error writing cacheline. Thus, it is dangerous to allocate a small memory buffer for DMA. It's always safe to define ARCH_DMA_MINALIGN as L1_CACHE_BYTES but unnecessary (kmalloc() need small memory objects). Therefore, just increase it to 16.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22049 is classified as a high severity vulnerability in the Linux kernel due to potential data corruption from improper data buffer alignment.
To fix CVE-2025-22049, it is recommended to update the Linux kernel to the latest version that addresses this vulnerability.
CVE-2025-22049 affects systems running the Linux kernel, particularly those utilizing LoongArch-specific devices.
ARCH_DMA_MINALIGN is a kernel parameter that specifies the minimum alignment for direct memory access operations, which is set to 1 by default in this vulnerability.
Exploitation of CVE-2025-22049 can lead to denial-of-service attacks or data corruption due to improper alignment of data buffers.