CVE-2024-49858

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption<br /> <br /> The TPM event log table is a Linux specific construct, where the data<br /> produced by the GetEventLog() boot service is cached in memory, and<br /> passed on to the OS using an EFI configuration table.<br /> <br /> The use of EFI_LOADER_DATA here results in the region being left<br /> unreserved in the E820 memory map constructed by the EFI stub, and this<br /> is the memory description that is passed on to the incoming kernel by<br /> kexec, which is therefore unaware that the region should be reserved.<br /> <br /> Even though the utility of the TPM2 event log after a kexec is<br /> questionable, any corruption might send the parsing code off into the<br /> weeds and crash the kernel. So let&amp;#39;s use EFI_ACPI_RECLAIM_MEMORY<br /> instead, which is always treated as reserved by the E820 conversion<br /> logic.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.10.227 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.168 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.113 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.54 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.10.13 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.11 (including) 6.11.2 (excluding)