Bug 2356917 (CVE-2025-21991) - CVE-2025-21991 kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes
Summary: CVE-2025-21991 kernel: x86/microcode/AMD: Fix out-of-bounds on systems with C...
Keywords:
Status: NEW
Alias: CVE-2025-21991
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-04-02 14:02 UTC by OSIDB Bzimport
Modified: 2025-10-16 08:16 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:10371 0 None None None 2025-07-07 06:01:54 UTC
Red Hat Product Errata RHSA-2025:10837 0 None None None 2025-07-14 02:07:48 UTC
Red Hat Product Errata RHSA-2025:11298 0 None None None 2025-07-16 05:58:20 UTC
Red Hat Product Errata RHSA-2025:11299 0 None None None 2025-07-16 05:45:22 UTC
Red Hat Product Errata RHSA-2025:13135 0 None None None 2025-08-06 07:51:31 UTC
Red Hat Product Errata RHSA-2025:13633 0 None None None 2025-08-11 14:17:55 UTC
Red Hat Product Errata RHSA-2025:13781 0 None None None 2025-08-13 09:36:29 UTC
Red Hat Product Errata RHSA-2025:14054 0 None None None 2025-08-19 00:18:31 UTC
Red Hat Product Errata RHSA-2025:14094 0 None None None 2025-08-19 13:16:49 UTC

Description OSIDB Bzimport 2025-04-02 14:02:35 UTC
In the Linux kernel, the following vulnerability has been resolved:

x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes

Currently, load_microcode_amd() iterates over all NUMA nodes, retrieves their
CPU masks and unconditionally accesses per-CPU data for the first CPU of each
mask.

According to Documentation/admin-guide/mm/numaperf.rst:

  "Some memory may share the same node as a CPU, and others are provided as
  memory only nodes."

Therefore, some node CPU masks may be empty and wouldn't have a "first CPU".

On a machine with far memory (and therefore CPU-less NUMA nodes):
- cpumask_of_node(nid) is 0
- cpumask_first(0) is CONFIG_NR_CPUS
- cpu_data(CONFIG_NR_CPUS) accesses the cpu_info per-CPU array at an
  index that is 1 out of bounds

This does not have any security implications since flashing microcode is
a privileged operation but I believe this has reliability implications by
potentially corrupting memory while flashing a microcode update.

When booting with CONFIG_UBSAN_BOUNDS=y on an AMD machine that flashes
a microcode update. I get the following splat:

  UBSAN: array-index-out-of-bounds in arch/x86/kernel/cpu/microcode/amd.c:X:Y
  index 512 is out of range for type 'unsigned long[512]'
  [...]
  Call Trace:
   dump_stack
   __ubsan_handle_out_of_bounds
   load_microcode_amd
   request_microcode_amd
   reload_store
   kernfs_fop_write_iter
   vfs_write
   ksys_write
   do_syscall_64
   entry_SYSCALL_64_after_hwframe

Change the loop to go over only NUMA nodes which have CPUs before determining
whether the first CPU on the respective node needs microcode update.

  [ bp: Massage commit message, fix typo. ]

Comment 2 errata-xmlrpc 2025-07-07 06:01:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:10371 https://access.redhat.com/errata/RHSA-2025:10371

Comment 3 errata-xmlrpc 2025-07-14 02:07:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:10837 https://access.redhat.com/errata/RHSA-2025:10837

Comment 4 errata-xmlrpc 2025-07-16 05:45:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:11299 https://access.redhat.com/errata/RHSA-2025:11299

Comment 5 errata-xmlrpc 2025-07-16 05:58:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:11298 https://access.redhat.com/errata/RHSA-2025:11298

Comment 9 errata-xmlrpc 2025-08-06 07:51:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:13135 https://access.redhat.com/errata/RHSA-2025:13135

Comment 10 errata-xmlrpc 2025-08-11 14:17:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2025:13633 https://access.redhat.com/errata/RHSA-2025:13633

Comment 11 errata-xmlrpc 2025-08-13 09:36:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2025:13781 https://access.redhat.com/errata/RHSA-2025:13781

Comment 12 errata-xmlrpc 2025-08-19 00:18:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:14054 https://access.redhat.com/errata/RHSA-2025:14054

Comment 13 errata-xmlrpc 2025-08-19 13:16:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:14094 https://access.redhat.com/errata/RHSA-2025:14094


Note You need to log in before you can comment on or make changes to this bug.