CVE-2025-40157
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
12/11/2025
Última modificación:
12/11/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller<br />
<br />
When loading the i10nm_edac driver on some Intel Granite Rapids servers,<br />
a call trace may appear as follows:<br />
<br />
UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16<br />
shift exponent -66 is negative<br />
...<br />
__ubsan_handle_shift_out_of_bounds+0x1e3/0x390<br />
skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]<br />
i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]<br />
skx_register_mci+0x159/0x220 [skx_edac_common]<br />
i10nm_init+0xcb0/0x1ff0 [i10nm_edac]<br />
...<br />
<br />
This occurs because some BIOS may disable a memory controller if there<br />
aren&#39;t any memory DIMMs populated on this memory controller. The DIMMMTR<br />
register of this disabled memory controller contains the invalid value<br />
~0, resulting in the call trace above.<br />
<br />
Fix this call trace by skipping DIMM enumeration on a disabled memory<br />
controller.



