CVE-2024-58005: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: tpm: Change to kvalloc() in eventlog/acpi.c The following failure was reported on HPE ProLiant D320: [ 10.693310][ T1] tpm_tis STM0925:00: 2.0 TPM (device-id 0x3, rev-id 0) [ 10.848132][ T1] ------------[ cut here ]------------ [ 10.853559][ T1] WARNING: CPU: 59 PID: 1 at mm/page_alloc.c:4727 __alloc_pages_noprof+0x2ca/0x330 [ 10.862827][ T1] Modules linked in: [ 10.866671][ T1] CPU: 59 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-lp155.2.g52785e2-default #1 openSUSE Tumbleweed (unreleased) 588cd98293a7c9eba9013378d807364c088c9375 [ 10.882741][ T1] Hardware name: HPE ProLiant DL320 Gen12/ProLiant DL320 Gen12, BIOS 1.20 10/28/2024 [ 10.892170][ T1] RIP: 0010:__alloc_pages_noprof+0x2ca/0x330 [ 10.898103][ T1] Code: 24 08 e9 4a fe ff ff e8 34 36 fa ff e9 88 fe ff ff 83 fe 0a 0f 86 b3 fd ff ff 80 3d 01 e7 ce 01 00 75 09 c6 05 f8 e6 ce 01 01 <0f> 0b 45 31 ff e9 e5 fe ff ff f7 c2 00 00 08 00 75 42 89 d9 80 e1 [ 10.917750][ T1] RSP: 0000:ffffb7cf40077980 EFLAGS: 00010246 [ 10.923777][ T1] RAX: 0000000000000000 RBX: 0000000000040cc0 RCX: 0000000000000000 [ 10.931727][ T1] RDX: 0000000000000000 RSI: 000000000000000c RDI: 0000000000040cc0 The above transcript shows that ACPI pointed a 16 MiB buffer for the log events because RSI maps to the 'order' parameter of __alloc_pages_noprof(). Address the bug by moving from devm_kmalloc() to devm_add_action() and kvmalloc() and devm_add_action().
AI Analysis
Technical Summary
CVE-2024-58005 is a vulnerability identified in the Linux kernel, specifically related to the Trusted Platform Module (TPM) driver implementation in the eventlog/acpi.c component. The issue arises from improper memory allocation handling when processing TPM event logs via ACPI. The vulnerability was observed on HPE ProLiant DL320 Gen12 servers running Linux kernel version 6.12.0-lp155.2 (openSUSE Tumbleweed). The kernel warning and stack trace indicate a failure in the __alloc_pages_noprof() function, triggered by an incorrect allocation order parameter (mapped from RSI register) that corresponds to a 16 MiB buffer allocation request. The root cause is linked to the use of devm_kmalloc() for buffer allocation, which is insufficient for large memory requests, leading to potential allocation failures or kernel warnings. The fix involves switching to kvmalloc() combined with devm_add_action() to properly manage large memory allocations and their lifecycle, ensuring that the TPM event log buffer is allocated safely and freed appropriately. This vulnerability is a kernel-level memory allocation flaw affecting TPM event log handling, which could lead to system instability or denial of service due to kernel warnings or crashes during boot or TPM operations. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability primarily impacts servers and systems running affected Linux kernel versions with TPM enabled, especially in enterprise environments using HPE ProLiant DL320 Gen12 or similar hardware. TPM is critical for hardware-based security functions such as secure boot, disk encryption key storage, and platform integrity verification. A failure in TPM event log handling could disrupt these security services, potentially causing system instability or denial of service. This could affect data center operations, cloud infrastructure, and critical enterprise applications relying on TPM for security assurances. Although no direct remote exploitation is indicated, the kernel-level nature means that local attackers or malicious processes with kernel privileges could trigger the issue, leading to potential service interruptions. The impact on confidentiality and integrity is indirect but availability could be affected due to kernel warnings or crashes. Organizations relying on TPM for compliance or security policies may face operational risks until patched.
Mitigation Recommendations
1. Immediate application of the Linux kernel patch that replaces devm_kmalloc() with kvmalloc() and devm_add_action() in the TPM eventlog/acpi.c code to ensure proper memory allocation and lifecycle management. 2. Upgrade Linux kernel to versions that include this fix, particularly for systems running on HPE ProLiant DL320 Gen12 hardware or similar platforms with TPM 2.0. 3. Conduct thorough testing of TPM functionality post-patch to verify stability and event log integrity. 4. Monitor kernel logs for warnings related to __alloc_pages_noprof() or TPM eventlog processing as indicators of potential exploitation or system issues. 5. Limit local user privileges to reduce risk of local exploitation, as the vulnerability requires kernel-level access to trigger. 6. Maintain up-to-date firmware and BIOS versions on affected hardware to complement kernel security. 7. Implement robust system monitoring and alerting for kernel panics or unusual TPM behavior to enable rapid response.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-58005: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: tpm: Change to kvalloc() in eventlog/acpi.c The following failure was reported on HPE ProLiant D320: [ 10.693310][ T1] tpm_tis STM0925:00: 2.0 TPM (device-id 0x3, rev-id 0) [ 10.848132][ T1] ------------[ cut here ]------------ [ 10.853559][ T1] WARNING: CPU: 59 PID: 1 at mm/page_alloc.c:4727 __alloc_pages_noprof+0x2ca/0x330 [ 10.862827][ T1] Modules linked in: [ 10.866671][ T1] CPU: 59 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-lp155.2.g52785e2-default #1 openSUSE Tumbleweed (unreleased) 588cd98293a7c9eba9013378d807364c088c9375 [ 10.882741][ T1] Hardware name: HPE ProLiant DL320 Gen12/ProLiant DL320 Gen12, BIOS 1.20 10/28/2024 [ 10.892170][ T1] RIP: 0010:__alloc_pages_noprof+0x2ca/0x330 [ 10.898103][ T1] Code: 24 08 e9 4a fe ff ff e8 34 36 fa ff e9 88 fe ff ff 83 fe 0a 0f 86 b3 fd ff ff 80 3d 01 e7 ce 01 00 75 09 c6 05 f8 e6 ce 01 01 <0f> 0b 45 31 ff e9 e5 fe ff ff f7 c2 00 00 08 00 75 42 89 d9 80 e1 [ 10.917750][ T1] RSP: 0000:ffffb7cf40077980 EFLAGS: 00010246 [ 10.923777][ T1] RAX: 0000000000000000 RBX: 0000000000040cc0 RCX: 0000000000000000 [ 10.931727][ T1] RDX: 0000000000000000 RSI: 000000000000000c RDI: 0000000000040cc0 The above transcript shows that ACPI pointed a 16 MiB buffer for the log events because RSI maps to the 'order' parameter of __alloc_pages_noprof(). Address the bug by moving from devm_kmalloc() to devm_add_action() and kvmalloc() and devm_add_action().
AI-Powered Analysis
Technical Analysis
CVE-2024-58005 is a vulnerability identified in the Linux kernel, specifically related to the Trusted Platform Module (TPM) driver implementation in the eventlog/acpi.c component. The issue arises from improper memory allocation handling when processing TPM event logs via ACPI. The vulnerability was observed on HPE ProLiant DL320 Gen12 servers running Linux kernel version 6.12.0-lp155.2 (openSUSE Tumbleweed). The kernel warning and stack trace indicate a failure in the __alloc_pages_noprof() function, triggered by an incorrect allocation order parameter (mapped from RSI register) that corresponds to a 16 MiB buffer allocation request. The root cause is linked to the use of devm_kmalloc() for buffer allocation, which is insufficient for large memory requests, leading to potential allocation failures or kernel warnings. The fix involves switching to kvmalloc() combined with devm_add_action() to properly manage large memory allocations and their lifecycle, ensuring that the TPM event log buffer is allocated safely and freed appropriately. This vulnerability is a kernel-level memory allocation flaw affecting TPM event log handling, which could lead to system instability or denial of service due to kernel warnings or crashes during boot or TPM operations. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability primarily impacts servers and systems running affected Linux kernel versions with TPM enabled, especially in enterprise environments using HPE ProLiant DL320 Gen12 or similar hardware. TPM is critical for hardware-based security functions such as secure boot, disk encryption key storage, and platform integrity verification. A failure in TPM event log handling could disrupt these security services, potentially causing system instability or denial of service. This could affect data center operations, cloud infrastructure, and critical enterprise applications relying on TPM for security assurances. Although no direct remote exploitation is indicated, the kernel-level nature means that local attackers or malicious processes with kernel privileges could trigger the issue, leading to potential service interruptions. The impact on confidentiality and integrity is indirect but availability could be affected due to kernel warnings or crashes. Organizations relying on TPM for compliance or security policies may face operational risks until patched.
Mitigation Recommendations
1. Immediate application of the Linux kernel patch that replaces devm_kmalloc() with kvmalloc() and devm_add_action() in the TPM eventlog/acpi.c code to ensure proper memory allocation and lifecycle management. 2. Upgrade Linux kernel to versions that include this fix, particularly for systems running on HPE ProLiant DL320 Gen12 hardware or similar platforms with TPM 2.0. 3. Conduct thorough testing of TPM functionality post-patch to verify stability and event log integrity. 4. Monitor kernel logs for warnings related to __alloc_pages_noprof() or TPM eventlog processing as indicators of potential exploitation or system issues. 5. Limit local user privileges to reduce risk of local exploitation, as the vulnerability requires kernel-level access to trigger. 6. Maintain up-to-date firmware and BIOS versions on affected hardware to complement kernel security. 7. Implement robust system monitoring and alerting for kernel panics or unusual TPM behavior to enable rapid response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-27T02:10:48.226Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9823c4522896dcbdeca6
Added to database: 5/21/2025, 9:08:51 AM
Last enriched: 6/28/2025, 9:55:19 AM
Last updated: 7/28/2025, 8:58:46 AM
Views: 8
Related Threats
CVE-2025-50610: n/a
HighCVE-2025-50609: n/a
HighCVE-2025-50608: n/a
HighCVE-2025-55194: CWE-248: Uncaught Exception in Part-DB Part-DB-server
MediumCVE-2025-55197: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.