CVE-2025-21872
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/03/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
efi: Don&#39;t map the entire mokvar table to determine its size<br />
<br />
Currently, when validating the mokvar table, we (re)map the entire table<br />
on each iteration of the loop, adding space as we discover new entries.<br />
If the table grows over a certain size, this fails due to limitations of<br />
early_memmap(), and we get a failure and traceback:<br />
<br />
------------[ cut here ]------------<br />
WARNING: CPU: 0 PID: 0 at mm/early_ioremap.c:139 __early_ioremap+0xef/0x220<br />
...<br />
Call Trace:<br />
<br />
? __early_ioremap+0xef/0x220<br />
? __warn.cold+0x93/0xfa<br />
? __early_ioremap+0xef/0x220<br />
? report_bug+0xff/0x140<br />
? early_fixup_exception+0x5d/0xb0<br />
? early_idt_handler_common+0x2f/0x3a<br />
? __early_ioremap+0xef/0x220<br />
? efi_mokvar_table_init+0xce/0x1d0<br />
? setup_arch+0x864/0xc10<br />
? start_kernel+0x6b/0xa10<br />
? x86_64_start_reservations+0x24/0x30<br />
? x86_64_start_kernel+0xed/0xf0<br />
? common_startup_64+0x13e/0x141<br />
<br />
---[ end trace 0000000000000000 ]---<br />
mokvar: Failed to map EFI MOKvar config table pa=0x7c4c3000, size=265187.<br />
<br />
Mapping the entire structure isn&#39;t actually necessary, as we don&#39;t ever<br />
need more than one entry header mapped at once.<br />
<br />
Changes efi_mokvar_table_init() to only map each entry header, not the<br />
entire table, when determining the table size. Since we&#39;re not mapping<br />
any data past the variable name, it also changes the code to enforce<br />
that each variable name is NUL terminated, rather than attempting to<br />
verify it in place.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10 (including) | 5.10.235 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 6.6.83 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.18 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2b90e7ace79774a3540ce569e000388f8d22c9e0
- https://git.kernel.org/stable/c/46c0454ffb78ce9d3355a3cccac86383ea8ddd55
- https://git.kernel.org/stable/c/65f4aebb8127708ba668dd938e83b8558abfc5cd
- https://git.kernel.org/stable/c/97bd560b6cc4c26386a53b4881bf03e96f9ba03a
- https://git.kernel.org/stable/c/ea3f0b362dfe4ef885ef812bfaf4088176422c91
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html



