Description
In the Linux kernel, the following vulnerability has been resolved:

EFI/CPER: don't dump the entire memory region

The current logic at cper_print_fw_err() doesn't check if the
error record length is big enough to handle offset. On a bad firmware,
if the ofset is above the actual record, length -= offset will
underflow, making it dump the entire memory.

The end result can be:

- the logic taking a lot of time dumping large regions of memory;
- data disclosure due to the memory dumps;
- an OOPS, if it tries to dump an unmapped memory region.

Fix it by checking if the section length is too small before doing
a hex dump.

[ rjw: Subject tweaks ]
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linux kernel contains a logic flaw in cper_print_fw_err() where the error record length is not validated against the offset when processing CPER firmware error data. On the presence of malformed firmware, subtracting the offset from the length can underflow, causing the routine to attempt to dump the entire memory region. An attacker who can supply such firmware can trigger this behaviour and cause excessive resource consumption, unintentional OOPS crashes, or expose kernel memory contents to userspace logs or consoles.

Affected Systems

Linux kernel instances, any configuration that loads CPER or EFI firmware records on boot or runtime. No specific kernel release is listed in the available data, so the issue may apply to all recent kernels until the patch is applied.

Risk and Exploitability

The conditions for exploitation require the attacker to influence the firmware record processed by the kernel, which can be achieved through deployment of malicious firmware or exploiting vendor supply chain trust. While the CVSS score is not provided, the potential for information disclosure and denial of service suggests a high severity vulnerability. No EPSS data is available and the vulnerability is not listed in the CISA KEV catalogue yet. An exploit would involve injecting a crafted firmware record that causes the memory dump to underflow and read outside the intended bounds, potentially exposing kernel or user memory.

Generated by OpenCVE AI on May 6, 2026 at 14:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel update that includes the patch fixing cper_print_fw_err() length validation
  • Disable or restrict the use of untrusted CPER/EFI firmware sources if possible
  • Ensure firmware integrity checks (e.g., signature verification) are enabled to prevent loading malformed firmware

Generated by OpenCVE AI on May 6, 2026 at 14:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 14:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-788

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: EFI/CPER: don't dump the entire memory region The current logic at cper_print_fw_err() doesn't check if the error record length is big enough to handle offset. On a bad firmware, if the ofset is above the actual record, length -= offset will underflow, making it dump the entire memory. The end result can be: - the logic taking a lot of time dumping large regions of memory; - data disclosure due to the memory dumps; - an OOPS, if it tries to dump an unmapped memory region. Fix it by checking if the section length is too small before doing a hex dump. [ rjw: Subject tweaks ]
Title EFI/CPER: don't dump the entire memory region
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:46.698Z

Reserved: 2026-05-01T14:12:55.990Z

Link: CVE-2026-43171

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:35.447

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43171

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T14:15:05Z

Weaknesses