CVE-2026-43171
UNKNOWN
NVD
CVSS Score
0
Severity
UNKNOWN
Published
May 06, 2026
Vendor
unknown
Description
In the Linux kernel, the following vulnerability has been resolved: EFI/CPER: don't dump the entire memory region The current logic at cper_print_fw_err() doesn't check if the error record length is big enough to handle offset. On a bad firmware, if the ofset is above the actual record, length -= offset will underflow, making it dump the entire memory. The end result can be: - the logic taking a lot of time dumping large regions of memory; - data disclosure due to the memory dumps; - an OOPS, if it tries to dump an unmapped memory region. Fix it by checking if the section length is too small before doing a hex dump. [ rjw: Subject tweaks ]
References
- https://git.kernel.org/stable/c/02de64ab54b4bb0f1b21bb324aeff3b08612be33
- https://git.kernel.org/stable/c/0e09b522f2622841389c3b2f9ac4969e35c0809d
- https://git.kernel.org/stable/c/54e131db4cdffd946db890ff33ff2647053fd4f6
- https://git.kernel.org/stable/c/55cc6fe5716f678f06bcb95140882dfa684464ec
- https://git.kernel.org/stable/c/5a9b1dda8481b82851a655c3bcc5b44879b95334