Impact
The Linux kernel driver zynqmp_nvmem uses an incorrect size for the buffer allocated with dma_alloc_coherent and for the subsequent memcpy operation. This mismatch means that the DMA buffer can be smaller than the data being written, leading to a buffer overrun and memory corruption. Such corruption may overwrite kernel memory structures, potentially destabilizing the kernel or corrupting other data. Based on the description, it is inferred that these memory corruptions could in theory trigger a system crash or provide a foothold for higher‑privilege code execution, though no specific exploit path is documented.
Affected Systems
All Linux kernel builds that include the zynqmp_nvmem driver are affected, regardless of distribution. The exact kernel versions in which the faulty buffer size logic exists are not specified, so any kernel lacking the fix that contains this driver is potentially vulnerable.
Risk and Exploitability
The EPSS score is unavailable and the vulnerability is not listed in the CISA KEV catalog, so the likelihood of exploitation remains unknown. The flaw appears to require usage of the DMA subsystem, implying that local or privileged execution might be necessary to trigger the overrun. No additional conditions or external inputs are documented, so the risk assessment is limited to the uncertainty surrounding exploitability.
OpenCVE Enrichment