CVE-2024-58005: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: tpm: Change to kvalloc() in eventlog/acpi.c The following failure was reported on HPE ProLiant D320: [ 10.693310][ T1] tpm_tis STM0925:00: 2.0 TPM (device-id 0x3, rev-id 0) [ 10.848132][ T1] ------------[ cut here ]------------ [ 10.853559][ T1] WARNING: CPU: 59 PID: 1 at mm/page_alloc.c:4727 __alloc_pages_noprof+0x2ca/0x330 [ 10.862827][ T1] Modules linked in: [ 10.866671][ T1] CPU: 59 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-lp155.2.g52785e2-default #1 openSUSE Tumbleweed (unreleased) 588cd98293a7c9eba9013378d807364c088c9375 [ 10.882741][ T1] Hardware name: HPE ProLiant DL320 Gen12/ProLiant DL320 Gen12, BIOS 1.20 10/28/2024 [ 10.892170][ T1] RIP: 0010:__alloc_pages_noprof+0x2ca/0x330 [ 10.898103][ T1] Code: 24 08 e9 4a fe ff ff e8 34 36 fa ff e9 88 fe ff ff 83 fe 0a 0f 86 b3 fd ff ff 80 3d 01 e7 ce 01 00 75 09 c6 05 f8 e6 ce 01 01 <0f> 0b 45 31 ff e9 e5 fe ff ff f7 c2 00 00 08 00 75 42 89 d9 80 e1 [ 10.917750][ T1] RSP: 0000:ffffb7cf40077980 EFLAGS: 00010246 [ 10.923777][ T1] RAX: 0000000000000000 RBX: 0000000000040cc0 RCX: 0000000000000000 [ 10.931727][ T1] RDX: 0000000000000000 RSI: 000000000000000c RDI: 0000000000040cc0 The above transcript shows that ACPI pointed a 16 MiB buffer for the log events because RSI maps to the 'order' parameter of __alloc_pages_noprof(). Address the bug by moving from devm_kmalloc() to devm_add_action() and kvmalloc() and devm_add_action().
AI Analysis
Technical Summary
CVE-2024-58005 is a vulnerability identified in the Linux kernel, specifically related to the Trusted Platform Module (TPM) driver implementation in the eventlog/acpi.c component. The issue arises from improper memory allocation handling when processing TPM event logs via ACPI. The vulnerability was observed on HPE ProLiant DL320 Gen12 servers running Linux kernel version 6.12.0-lp155.2 (openSUSE Tumbleweed). The kernel warning and stack trace indicate a failure in the __alloc_pages_noprof() function, triggered by an incorrect allocation order parameter (mapped from RSI register) that corresponds to a 16 MiB buffer allocation request. The root cause is linked to the use of devm_kmalloc() for buffer allocation, which is insufficient for large memory requests, leading to potential allocation failures or kernel warnings. The fix involves switching to kvmalloc() combined with devm_add_action() to properly manage large memory allocations and their lifecycle, ensuring that the TPM event log buffer is allocated safely and freed appropriately. This vulnerability is a kernel-level memory allocation flaw affecting TPM event log handling, which could lead to system instability or denial of service due to kernel warnings or crashes during boot or TPM operations. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability primarily impacts servers and systems running affected Linux kernel versions with TPM enabled, especially in enterprise environments using HPE ProLiant DL320 Gen12 or similar hardware. TPM is critical for hardware-based security functions such as secure boot, disk encryption key storage, and platform integrity verification. A failure in TPM event log handling could disrupt these security services, potentially causing system instability or denial of service. This could affect data center operations, cloud infrastructure, and critical enterprise applications relying on TPM for security assurances. Although no direct remote exploitation is indicated, the kernel-level nature means that local attackers or malicious processes with kernel privileges could trigger the issue, leading to potential service interruptions. The impact on confidentiality and integrity is indirect but availability could be affected due to kernel warnings or crashes. Organizations relying on TPM for compliance or security policies may face operational risks until patched.
Mitigation Recommendations
1. Immediate application of the Linux kernel patch that replaces devm_kmalloc() with kvmalloc() and devm_add_action() in the TPM eventlog/acpi.c code to ensure proper memory allocation and lifecycle management. 2. Upgrade Linux kernel to versions that include this fix, particularly for systems running on HPE ProLiant DL320 Gen12 hardware or similar platforms with TPM 2.0. 3. Conduct thorough testing of TPM functionality post-patch to verify stability and event log integrity. 4. Monitor kernel logs for warnings related to __alloc_pages_noprof() or TPM eventlog processing as indicators of potential exploitation or system issues. 5. Limit local user privileges to reduce risk of local exploitation, as the vulnerability requires kernel-level access to trigger. 6. Maintain up-to-date firmware and BIOS versions on affected hardware to complement kernel security. 7. Implement robust system monitoring and alerting for kernel panics or unusual TPM behavior to enable rapid response.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-58005: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: tpm: Change to kvalloc() in eventlog/acpi.c The following failure was reported on HPE ProLiant D320: [ 10.693310][ T1] tpm_tis STM0925:00: 2.0 TPM (device-id 0x3, rev-id 0) [ 10.848132][ T1] ------------[ cut here ]------------ [ 10.853559][ T1] WARNING: CPU: 59 PID: 1 at mm/page_alloc.c:4727 __alloc_pages_noprof+0x2ca/0x330 [ 10.862827][ T1] Modules linked in: [ 10.866671][ T1] CPU: 59 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-lp155.2.g52785e2-default #1 openSUSE Tumbleweed (unreleased) 588cd98293a7c9eba9013378d807364c088c9375 [ 10.882741][ T1] Hardware name: HPE ProLiant DL320 Gen12/ProLiant DL320 Gen12, BIOS 1.20 10/28/2024 [ 10.892170][ T1] RIP: 0010:__alloc_pages_noprof+0x2ca/0x330 [ 10.898103][ T1] Code: 24 08 e9 4a fe ff ff e8 34 36 fa ff e9 88 fe ff ff 83 fe 0a 0f 86 b3 fd ff ff 80 3d 01 e7 ce 01 00 75 09 c6 05 f8 e6 ce 01 01 <0f> 0b 45 31 ff e9 e5 fe ff ff f7 c2 00 00 08 00 75 42 89 d9 80 e1 [ 10.917750][ T1] RSP: 0000:ffffb7cf40077980 EFLAGS: 00010246 [ 10.923777][ T1] RAX: 0000000000000000 RBX: 0000000000040cc0 RCX: 0000000000000000 [ 10.931727][ T1] RDX: 0000000000000000 RSI: 000000000000000c RDI: 0000000000040cc0 The above transcript shows that ACPI pointed a 16 MiB buffer for the log events because RSI maps to the 'order' parameter of __alloc_pages_noprof(). Address the bug by moving from devm_kmalloc() to devm_add_action() and kvmalloc() and devm_add_action().
AI-Powered Analysis
Technical Analysis
CVE-2024-58005 is a vulnerability identified in the Linux kernel, specifically related to the Trusted Platform Module (TPM) driver implementation in the eventlog/acpi.c component. The issue arises from improper memory allocation handling when processing TPM event logs via ACPI. The vulnerability was observed on HPE ProLiant DL320 Gen12 servers running Linux kernel version 6.12.0-lp155.2 (openSUSE Tumbleweed). The kernel warning and stack trace indicate a failure in the __alloc_pages_noprof() function, triggered by an incorrect allocation order parameter (mapped from RSI register) that corresponds to a 16 MiB buffer allocation request. The root cause is linked to the use of devm_kmalloc() for buffer allocation, which is insufficient for large memory requests, leading to potential allocation failures or kernel warnings. The fix involves switching to kvmalloc() combined with devm_add_action() to properly manage large memory allocations and their lifecycle, ensuring that the TPM event log buffer is allocated safely and freed appropriately. This vulnerability is a kernel-level memory allocation flaw affecting TPM event log handling, which could lead to system instability or denial of service due to kernel warnings or crashes during boot or TPM operations. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability primarily impacts servers and systems running affected Linux kernel versions with TPM enabled, especially in enterprise environments using HPE ProLiant DL320 Gen12 or similar hardware. TPM is critical for hardware-based security functions such as secure boot, disk encryption key storage, and platform integrity verification. A failure in TPM event log handling could disrupt these security services, potentially causing system instability or denial of service. This could affect data center operations, cloud infrastructure, and critical enterprise applications relying on TPM for security assurances. Although no direct remote exploitation is indicated, the kernel-level nature means that local attackers or malicious processes with kernel privileges could trigger the issue, leading to potential service interruptions. The impact on confidentiality and integrity is indirect but availability could be affected due to kernel warnings or crashes. Organizations relying on TPM for compliance or security policies may face operational risks until patched.
Mitigation Recommendations
1. Immediate application of the Linux kernel patch that replaces devm_kmalloc() with kvmalloc() and devm_add_action() in the TPM eventlog/acpi.c code to ensure proper memory allocation and lifecycle management. 2. Upgrade Linux kernel to versions that include this fix, particularly for systems running on HPE ProLiant DL320 Gen12 hardware or similar platforms with TPM 2.0. 3. Conduct thorough testing of TPM functionality post-patch to verify stability and event log integrity. 4. Monitor kernel logs for warnings related to __alloc_pages_noprof() or TPM eventlog processing as indicators of potential exploitation or system issues. 5. Limit local user privileges to reduce risk of local exploitation, as the vulnerability requires kernel-level access to trigger. 6. Maintain up-to-date firmware and BIOS versions on affected hardware to complement kernel security. 7. Implement robust system monitoring and alerting for kernel panics or unusual TPM behavior to enable rapid response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-27T02:10:48.226Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9823c4522896dcbdeca6
Added to database: 5/21/2025, 9:08:51 AM
Last enriched: 6/28/2025, 9:55:19 AM
Last updated: 11/22/2025, 5:54:30 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
MediumCVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.