CVE-2025-21991

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21991
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21991.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21991
Downstream
Related
Published
2025-04-02T12:53:14.230Z
Modified
2025-11-28T02:35:23.639087Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes
Details

In the Linux kernel, the following vulnerability has been resolved:

x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes

Currently, loadmicrocodeamd() iterates over all NUMA nodes, retrieves their CPU masks and unconditionally accesses per-CPU data for the first CPU of each mask.

According to Documentation/admin-guide/mm/numaperf.rst:

"Some memory may share the same node as a CPU, and others are provided as memory only nodes."

Therefore, some node CPU masks may be empty and wouldn't have a "first CPU".

On a machine with far memory (and therefore CPU-less NUMA nodes): - cpumaskofnode(nid) is 0 - cpumaskfirst(0) is CONFIGNRCPUS - cpudata(CONFIGNRCPUS) accesses the cpu_info per-CPU array at an index that is 1 out of bounds

This does not have any security implications since flashing microcode is a privileged operation but I believe this has reliability implications by potentially corrupting memory while flashing a microcode update.

When booting with CONFIGUBSANBOUNDS=y on an AMD machine that flashes a microcode update. I get the following splat:

UBSAN: array-index-out-of-bounds in arch/x86/kernel/cpu/microcode/amd.c:X:Y index 512 is out of range for type 'unsigned long[512]' [...] Call Trace: dumpstack _ubsanhandleoutofbounds loadmicrocodeamd requestmicrocodeamd reloadstore kernfsfopwriteiter vfswrite ksyswrite dosyscall64 entrySYSCALL64afterhwframe

Change the loop to go over only NUMA nodes which have CPUs before determining whether the first CPU on the respective node needs microcode update.

[ bp: Massage commit message, fix typo. ]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21991.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
979e197968a1e8f09bf0d706801dba4432f85ab3
Fixed
d509c4731090ebd9bbdb72c70a2d70003ae81f4f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
44a44b57e88f311c1415be1f567c50050913c149
Fixed
985a536e04bbfffb1770df43c6470f635a6b1073
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
be2710deaed3ab1402379a2ede30a3754fe6767a
Fixed
18b5d857c6496b78ead2fd10001b81ae32d30cac
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d576547f489c935b9897d4acf8beee3325dea8a5
Fixed
ec52240622c4d218d0240079b7c1d3ec2328a9f4
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7ff6edf4fef38ab404ee7861f257e28eaaeed35f
Fixed
e686349cc19e800dac8971929089ba5ff59abfb0
Fixed
488ffc0cac38f203979f83634236ee53251ce593
Fixed
5ac295dfccb5b015493f86694fa13a0dde4d3665
Fixed
e3e89178a9f4a80092578af3ff3c8478f9187d59
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
d6353e2fc12c5b8f00f86efa30ed73d2da2f77be
Last affected
1b1e0eb1d2971a686b9f7bdc146115bcefcbb960
Last affected
eaf5dea1eb8c2928554b3ca717575cbe232b843c

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.292
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.236
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.180
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.132
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.84
Type
ECOSYSTEM
Events
Introduced
6.3.0
Fixed
6.12.20
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.13.8