HomeLinuxCVE-2025-39869

CVE-2025-39869

HIGH
7.1CVSS
Published: 2025-09-23
Updated: 2026-01-20
AI Analysis

Description

In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: edma: Fix memory allocation size for queue_priority_map Fix a critical memory allocation bug in edma_setup_from_hw() where queue_priority_map was allocated with insufficient memory. The code declared queue_priority_map as s8 (*)[2] (pointer to array of 2 s8), but allocated memory using sizeof(s8) instead of the correct size. This caused out-of-bounds memory writes when accessing: queue_priority_map[i][0] = i; queue_priority_map[i][1] = i; The bug manifested as kernel crashes with "Oops - undefined instruction" on ARM platforms (BeagleBoard-X15) during EDMA driver probe, as the memory corruption triggered kernel hardening features on Clang. Change the allocation to use sizeof(*queue_priority_map) which automatically gets the correct size for the 2D array structure.

CVSS Metrics

Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Attack Vector
local
Complexity
low
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
none
Availability
high
Weaknesses
CWE-125

Metadata

Primary Vendor
LINUX
Published
9/23/2025
Last Modified
1/20/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

linux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kerneldebian : debian_linux

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-39869 | HIGH Severity | CVEDatabase.com | CVEDatabase.com