CVE-2026-23352

Source
https://cve.org/CVERecord?id=CVE-2026-23352
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23352.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23352
Downstream
Published
2026-03-25T10:27:37.500Z
Modified
2026-04-14T03:47:32.514686Z
Summary
x86/efi: defer freeing of boot services memory
Details

In the Linux kernel, the following vulnerability has been resolved:

x86/efi: defer freeing of boot services memory

efifreebootservices() frees memory occupied by EFIBOOTSERVICESCODE and EFIBOOTSERVICESDATA using memblockfree_late().

There are two issue with that: memblockfreelate() should be used for memory allocated with memblockalloc() while the memory reserved with memblockreserve() should be freed with freereservedarea().

More acutely, with CONFIGDEFERREDSTRUCTPAGEINIT=y efifreeboot_services() is called before deferred initialization of the memory map is complete.

Benjamin Herrenschmidt reports that this causes a leak of ~140MB of RAM on EC2 t3a.nano instances which only have 512MB or RAM.

If the freed memory resides in the areas that memory map for them is still uninitialized, they won't be actually freed because memblockfreelate() calls memblockfreepages() and the latter skips uninitialized pages.

Using freereservedarea() at this point is also problematic because _freepage() accesses the buddy of the freed page and that again might end up in uninitialized part of the memory map.

Delaying the entire efifreeboot_services() could be problematic because in addition to freeing boot services memory it updates efi.memmap without any synchronization and that's undesirable late in boot when there is concurrency.

More robust approach is to only defer freeing of the EFI boot services memory.

Split efifreebootservices() in two. First efiunmapbootservices() collects ranges that should be freed into an array then efifreeboot_services() later frees them after deferred init is complete.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23352.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0aed459e8487eb6ebdb4efe8cefe1eafbc704b30
Fixed
4a2cb90c538f06c873a187aa743575d48685d7a6
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
916f676f8dc016103f983c7ec54c18ecdbb6e349
Fixed
227688312fece0026fc67a00ba9a0b3611ebe95d
Fixed
6a25e25279282c5c8ade554c04c6ab9dc7902c64
Fixed
399da820ecfe6f4f10c143e5c453d3559a04db9c
Fixed
f9e9cc320854a76a39e7bc92d144554f3a727fad
Fixed
7dcf59422a3b0d20ddda844f856b4a1e0608a326
Fixed
a4b0bf6a40f3c107c67a24fbc614510ef5719980

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23352.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.39.2
Type
ECOSYSTEM
Events
Introduced
2.7.0
Fixed
6.1.167
Type
ECOSYSTEM
Events
Introduced
3.0.0
Fixed
6.6.130
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.12.77
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.18.17
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.19.7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23352.json"