Bug 2309780 (CVE-2024-44949) - CVE-2024-44949 kernel: parisc: fix a possible DMA corruption
Summary: CVE-2024-44949 kernel: parisc: fix a possible DMA corruption
Keywords:
Status: NEW
Alias: CVE-2024-44949
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2309897
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-09-04 19:20 UTC by OSIDB Bzimport
Modified: 2024-09-04 21:15 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-09-04 19:20:33 UTC
In the Linux kernel, the following vulnerability has been resolved:

parisc: fix a possible DMA corruption

ARCH_DMA_MINALIGN was defined as 16 - this is too small - it may be
possible that two unrelated 16-byte allocations share a cache line. If
one of these allocations is written using DMA and the other is written
using cached write, the value that was written with DMA may be
corrupted.

This commit changes ARCH_DMA_MINALIGN to be 128 on PA20 and 32 on PA1.1 -
that's the largest possible cache line size.

As different parisc microarchitectures have different cache line size, we
define arch_slab_minalign(), cache_line_size() and
dma_get_cache_alignment() so that the kernel may tune slab cache
parameters dynamically, based on the detected cache line size.


Note You need to log in before you can comment on or make changes to this bug.