### [CVE-2024-53225](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53225) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=918eb5c856f6ce4cf93b4b38e4b5e156905c5943%3C%2085a1d70b86dbcb84a68e7e4942a5181276945988%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description In the Linux kernel, the following vulnerability has been resolved:iommu/tegra241-cmdqv: Fix alignment failure at max_n_shiftWhen configuring a kernel with PAGE_SIZE=4KB, depending on its setting ofCONFIG_CMA_ALIGNMENT, VCMDQ_LOG2SIZE_MAX=19 could fail the alignment testand trigger a WARN_ON: WARNING: at drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c:3646 Call trace: arm_smmu_init_one_queue+0x15c/0x210 tegra241_cmdqv_init_structures+0x114/0x338 arm_smmu_device_probe+0xb48/0x1d90Fix it by capping max_n_shift to CMDQ_MAX_SZ_SHIFT as SMMUv3 CMDQ does. ### POC #### Reference No PoCs from references. #### Github - https://github.com/cku-heise/euvd-api-doc