{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T18:15:05.802","vulnerabilities":[{"cve":{"id":"CVE-2025-40157","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-11-12T11:15:45.763","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n  UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n  shift exponent -66 is negative\n  ...\n  __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n  skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n  i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n  skx_register_mci+0x159/0x220 [skx_edac_common]\n  i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n  ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren't any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/1652f14cf3bef5a4baa232de954fc22bdcaa78fe","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/2e6fe1bbefd9c059c3787d1c620fe67343a94dff","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/8100b6c0f9089d5b156642b81270ce27fff17490","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/c20da24272f1ac79e9f9083bba577d049cd02bbb","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}