From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Location: - Type: Using ACPI reclaim memory for event log to avoid corruption - Impact: Data in the TPM event log table is cached in memory during Linux-specific construction and passed to the OS via the EFI configuration table. Using causes this region to be unreserved in the E820 memory map, potentially leading to memory leaks and security risks. 2. Fix: - Fixed by using to prevent memory leaks and potential security risks. 3. Authors and Contributors: - Author: Ard Biesheuvel - Contributor: Greg Kroah-Hartman 4. Code Changes: - Changes were made in the file . - Specific changes include: - Replacing with . - Modifying the implementation of the function. 5. Testing and Verification: - Reporter: Breno Leitao - Tester: Usama Arif - Reviewer: Ilias Apalodimas 梁 Signers: Ard Biesheuvel and Greg Kroah-Hartman 6. Patch Status: - Status: Fixed - Patch Size: 2 lines of code changed This information helps us understand the vulnerability's background, the applied fix, and the verification process, enabling a better assessment and comprehension of the vulnerability's impact and remediation.