CVE-2026-43171
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
06/05/2026
Última modificación:
06/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
EFI/CPER: don&#39;t dump the entire memory region<br />
<br />
The current logic at cper_print_fw_err() doesn&#39;t check if the<br />
error record length is big enough to handle offset. On a bad firmware,<br />
if the ofset is above the actual record, length -= offset will<br />
underflow, making it dump the entire memory.<br />
<br />
The end result can be:<br />
<br />
- the logic taking a lot of time dumping large regions of memory;<br />
- data disclosure due to the memory dumps;<br />
- an OOPS, if it tries to dump an unmapped memory region.<br />
<br />
Fix it by checking if the section length is too small before doing<br />
a hex dump.<br />
<br />
[ rjw: Subject tweaks ]
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/02de64ab54b4bb0f1b21bb324aeff3b08612be33
- https://git.kernel.org/stable/c/0e09b522f2622841389c3b2f9ac4969e35c0809d
- https://git.kernel.org/stable/c/54e131db4cdffd946db890ff33ff2647053fd4f6
- https://git.kernel.org/stable/c/55cc6fe5716f678f06bcb95140882dfa684464ec
- https://git.kernel.org/stable/c/5a9b1dda8481b82851a655c3bcc5b44879b95334
- https://git.kernel.org/stable/c/64ae5aaa7ac93c83da456039e8ec747bfa8a7cff
- https://git.kernel.org/stable/c/7780c0bad2a3a70a8c0113a33c02f4151d901eb3
- https://git.kernel.org/stable/c/a8419f5f2c5f2d80848ddabb2b95cf0da84a5f91



