CVE-2025-21991
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
02/04/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes<br />
<br />
Currently, load_microcode_amd() iterates over all NUMA nodes, retrieves their<br />
CPU masks and unconditionally accesses per-CPU data for the first CPU of each<br />
mask.<br />
<br />
According to Documentation/admin-guide/mm/numaperf.rst:<br />
<br />
"Some memory may share the same node as a CPU, and others are provided as<br />
memory only nodes."<br />
<br />
Therefore, some node CPU masks may be empty and wouldn&#39;t have a "first CPU".<br />
<br />
On a machine with far memory (and therefore CPU-less NUMA nodes):<br />
- cpumask_of_node(nid) is 0<br />
- cpumask_first(0) is CONFIG_NR_CPUS<br />
- cpu_data(CONFIG_NR_CPUS) accesses the cpu_info per-CPU array at an<br />
index that is 1 out of bounds<br />
<br />
This does not have any security implications since flashing microcode is<br />
a privileged operation but I believe this has reliability implications by<br />
potentially corrupting memory while flashing a microcode update.<br />
<br />
When booting with CONFIG_UBSAN_BOUNDS=y on an AMD machine that flashes<br />
a microcode update. I get the following splat:<br />
<br />
UBSAN: array-index-out-of-bounds in arch/x86/kernel/cpu/microcode/amd.c:X:Y<br />
index 512 is out of range for type &#39;unsigned long[512]&#39;<br />
[...]<br />
Call Trace:<br />
dump_stack<br />
__ubsan_handle_out_of_bounds<br />
load_microcode_amd<br />
request_microcode_amd<br />
reload_store<br />
kernfs_fop_write_iter<br />
vfs_write<br />
ksys_write<br />
do_syscall_64<br />
entry_SYSCALL_64_after_hwframe<br />
<br />
Change the loop to go over only NUMA nodes which have CPUs before determining<br />
whether the first CPU on the respective node needs microcode update.<br />
<br />
[ bp: Massage commit message, fix typo. ]
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.14.308 (including) | 4.15 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.276 (including) | 4.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.235 (including) | 5.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.173 (including) | 5.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.99 (including) | 5.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.16 (including) | 6.1.132 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2.3 (including) | 6.6.84 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/18b5d857c6496b78ead2fd10001b81ae32d30cac
- https://git.kernel.org/stable/c/488ffc0cac38f203979f83634236ee53251ce593
- https://git.kernel.org/stable/c/5ac295dfccb5b015493f86694fa13a0dde4d3665
- https://git.kernel.org/stable/c/985a536e04bbfffb1770df43c6470f635a6b1073
- https://git.kernel.org/stable/c/d509c4731090ebd9bbdb72c70a2d70003ae81f4f
- https://git.kernel.org/stable/c/e3e89178a9f4a80092578af3ff3c8478f9187d59
- https://git.kernel.org/stable/c/e686349cc19e800dac8971929089ba5ff59abfb0
- https://git.kernel.org/stable/c/ec52240622c4d218d0240079b7c1d3ec2328a9f4
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



