Impact
The Linux kernel contains a flaw in the EFI boot services memory release routine, where allocated boot‑service memory is freed using memblock_free_late() instead of free_reserved_area(). This misuse can cause a leak of approximately 140 MB of RAM on systems with limited memory, such as EC2 t3a.nano instances, leading to memory exhaustion and potentially a system crash. The weakness is a Memory Management issue, classified as CWE‑763 (Memory Exhaustion).
Affected Systems
Any machine running the Linux kernel on an x86 system that utilizes UEFI boot services and has the CONFIG_DEFERRED_STRUCT_PAGE_INIT option enabled is affected. The CPE indicates the Linux kernel as the impacted product, but no specific kernel version is listed. The issue is inherent to the EFI subsystem of the kernel rather than a particular distribution.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, while the EPSS score of less than 1 % shows a very low projected exploitation probability. Based on the description, it is inferred that the vulnerability can only be exploited during the early boot phase, requiring local access to the machine’s boot process, and no remote attack vector is explicitly documented. Therefore, while the risk is limited to memory‑constrained environments, the bug can degrade performance or cause a denial of service once sufficient memory is consumed.
OpenCVE Enrichment