SB2026032598 - Type conversion in Linux kernel firmware efi driver
Published: March 25, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Type conversion (CVE-ID: CVE-2026-23352)
The vulnerability allows a local attacker to cause a denial of service.
The vulnerability exists due to improper memory management in the EFI boot services memory release mechanism when processing memory map initialization during system boot. A local attacker can trigger the early release of boot services memory before deferred memory map initialization is complete, leading to unfreed memory pages and a memory leak.
The issue specifically occurs on systems with CONFIG_DEFERRED_STRUCT_PAGE_INIT enabled, where memblock_free_late() skips uninitialized pages, resulting in a significant memory leak—up to approximately 140MB on constrained systems like EC2 t3a.nano instances with only 512MB RAM.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/227688312fece0026fc67a00ba9a0b3611ebe95d
- https://git.kernel.org/stable/c/399da820ecfe6f4f10c143e5c453d3559a04db9c
- https://git.kernel.org/stable/c/4a2cb90c538f06c873a187aa743575d48685d7a6
- https://git.kernel.org/stable/c/6a25e25279282c5c8ade554c04c6ab9dc7902c64
- https://git.kernel.org/stable/c/7dcf59422a3b0d20ddda844f856b4a1e0608a326
- https://git.kernel.org/stable/c/a4b0bf6a40f3c107c67a24fbc614510ef5719980
- https://git.kernel.org/stable/c/f9e9cc320854a76a39e7bc92d144554f3a727fad