๐Ÿ” CVE Alert

CVE-2024-49858

UNKNOWN 0.0

efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption The TPM event log table is a Linux specific construct, where the data produced by the GetEventLog() boot service is cached in memory, and passed on to the OS using an EFI configuration table. The use of EFI_LOADER_DATA here results in the region being left unreserved in the E820 memory map constructed by the EFI stub, and this is the memory description that is passed on to the incoming kernel by kexec, which is therefore unaware that the region should be reserved. Even though the utility of the TPM2 event log after a kexec is questionable, any corruption might send the parsing code off into the weeds and crash the kernel. So let's use EFI_ACPI_RECLAIM_MEMORY instead, which is always treated as reserved by the E820 conversion logic.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
33b6d03469b2206fb51ecc37f40411a857ad8fff < f76b69ab9cf04358266e3cea5748c0c2791fbb08 33b6d03469b2206fb51ecc37f40411a857ad8fff < 11690d7e76842f29b60fbb5b35bc97d206ea0e83 33b6d03469b2206fb51ecc37f40411a857ad8fff < 5b22c038fb2757c652642933de5664da471f8cb7 33b6d03469b2206fb51ecc37f40411a857ad8fff < 19fd2f2c5fb36b61506d3208474bfd8fdf1cada3 33b6d03469b2206fb51ecc37f40411a857ad8fff < 38d9b07d99b789efb6d8dda21f1aaad636c38993 33b6d03469b2206fb51ecc37f40411a857ad8fff < 2e6871a632a99d9b9e2ce3a7847acabe99e5a26e 33b6d03469b2206fb51ecc37f40411a857ad8fff < 77d48d39e99170b528e4f2e9fc5d1d64cdedd386
Linux / Linux
4.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/f76b69ab9cf04358266e3cea5748c0c2791fbb08 git.kernel.org: https://git.kernel.org/stable/c/11690d7e76842f29b60fbb5b35bc97d206ea0e83 git.kernel.org: https://git.kernel.org/stable/c/5b22c038fb2757c652642933de5664da471f8cb7 git.kernel.org: https://git.kernel.org/stable/c/19fd2f2c5fb36b61506d3208474bfd8fdf1cada3 git.kernel.org: https://git.kernel.org/stable/c/38d9b07d99b789efb6d8dda21f1aaad636c38993 git.kernel.org: https://git.kernel.org/stable/c/2e6871a632a99d9b9e2ce3a7847acabe99e5a26e git.kernel.org: https://git.kernel.org/stable/c/77d48d39e99170b528e4f2e9fc5d1d64cdedd386 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html