CVE-2025-40157
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's EDAC/i10nm driver when it attempts to enumerate DIMMs on a disabled memory controller. Some BIOS configurations disable memory controllers if no memory DIMMs are populated, causing the DIMMMTR register to hold an invalid value (~0). This leads to a call trace error involving a shift-out-of-bounds operation. The fix involves skipping DIMM enumeration on disabled memory controllers to prevent this error.
How can this vulnerability impact me? :
This vulnerability can cause errors or crashes in the Linux kernel when the i10nm_edac driver tries to access invalid memory controller information. This may affect system stability or reliability on affected Intel Granite Rapids servers with certain BIOS configurations that disable memory controllers without DIMMs.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel logs for call traces related to the i10nm_edac driver, specifically messages indicating 'UBSAN: shift-out-of-bounds' errors in drivers/edac/skx_common.c. You can check the kernel log using commands such as 'dmesg | grep i10nm_edac' or 'journalctl -k | grep i10nm_edac' to look for these error traces.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the i10nm_edac driver has been fixed to skip DIMM enumeration on disabled memory controllers. Until then, monitoring kernel logs for the described call trace can help identify affected systems. There are no specific configuration changes or patches mentioned other than applying the fix in the kernel.