CVE-2024-58008: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y With vmalloc stack addresses enabled (CONFIG_VMAP_STACK=y) DCP trusted keys can crash during en- and decryption of the blob encryption key via the DCP crypto driver. This is caused by improperly using sg_init_one() with vmalloc'd stack buffers (plain_key_blob). Fix this by always using kmalloc() for buffers we give to the DCP crypto driver.
AI Analysis
Technical Summary
CVE-2024-58008 is a vulnerability identified in the Linux kernel related to the handling of trusted keys within the DCP (Data Co-Processor) crypto driver when the kernel is configured with vmalloc stack addresses enabled (CONFIG_VMAP_STACK=y). The issue arises from improper use of the sg_init_one() function with vmalloc'd stack buffers, specifically the plain_key_blob buffer used during encryption and decryption of blob encryption keys. The improper use of sg_init_one() with vmalloc'd buffers can lead to crashes in the DCP trusted keys subsystem. The root cause is that sg_init_one() expects physically contiguous memory, which vmalloc'd buffers do not guarantee, leading to improper scatter-gather list initialization. The fix implemented involves replacing vmalloc'd stack buffers with kmalloc()-allocated buffers for the data passed to the DCP crypto driver, ensuring proper memory handling and preventing crashes. This vulnerability affects specific Linux kernel versions identified by commit hashes, and it is relevant only when the kernel is built with CONFIG_VMAP_STACK enabled, a configuration that randomizes stack addresses for security. No known exploits are reported in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2024-58008 depends largely on their use of Linux systems with the CONFIG_VMAP_STACK=y configuration and reliance on the DCP crypto driver for trusted key operations. The vulnerability can cause kernel crashes (denial of service) during encryption or decryption operations involving trusted keys, potentially disrupting critical services that depend on secure key management and cryptographic operations. This could affect servers, embedded devices, or specialized hardware running Linux kernels with this configuration. While the vulnerability does not directly lead to privilege escalation or data leakage, the resulting system instability or downtime could impact availability and operational continuity, especially in environments requiring high reliability such as financial institutions, healthcare, and critical infrastructure. Since no known exploits exist yet, the immediate risk is moderate, but organizations should prioritize patching to prevent potential future exploitation. The vulnerability also highlights the importance of secure kernel configuration and memory management in cryptographic subsystems.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Identify Linux systems running kernels with CONFIG_VMAP_STACK enabled and using the DCP crypto driver for trusted keys. 2) Apply the official Linux kernel patches that replace vmalloc'd stack buffers with kmalloc()-allocated buffers as soon as they become available from trusted Linux distributions or kernel maintainers. 3) If patching is not immediately possible, consider disabling CONFIG_VMAP_STACK or the DCP crypto driver if feasible and if it does not impact critical functionality, as a temporary mitigation. 4) Monitor system logs and kernel crash reports for signs of instability related to trusted key operations. 5) Implement robust kernel update and configuration management processes to ensure timely deployment of security fixes. 6) Engage with hardware and software vendors to confirm the impact on embedded devices or specialized Linux-based systems and coordinate patching efforts. 7) Conduct testing in controlled environments before deploying patches in production to avoid unintended disruptions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-58008: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y With vmalloc stack addresses enabled (CONFIG_VMAP_STACK=y) DCP trusted keys can crash during en- and decryption of the blob encryption key via the DCP crypto driver. This is caused by improperly using sg_init_one() with vmalloc'd stack buffers (plain_key_blob). Fix this by always using kmalloc() for buffers we give to the DCP crypto driver.
AI-Powered Analysis
Technical Analysis
CVE-2024-58008 is a vulnerability identified in the Linux kernel related to the handling of trusted keys within the DCP (Data Co-Processor) crypto driver when the kernel is configured with vmalloc stack addresses enabled (CONFIG_VMAP_STACK=y). The issue arises from improper use of the sg_init_one() function with vmalloc'd stack buffers, specifically the plain_key_blob buffer used during encryption and decryption of blob encryption keys. The improper use of sg_init_one() with vmalloc'd buffers can lead to crashes in the DCP trusted keys subsystem. The root cause is that sg_init_one() expects physically contiguous memory, which vmalloc'd buffers do not guarantee, leading to improper scatter-gather list initialization. The fix implemented involves replacing vmalloc'd stack buffers with kmalloc()-allocated buffers for the data passed to the DCP crypto driver, ensuring proper memory handling and preventing crashes. This vulnerability affects specific Linux kernel versions identified by commit hashes, and it is relevant only when the kernel is built with CONFIG_VMAP_STACK enabled, a configuration that randomizes stack addresses for security. No known exploits are reported in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2024-58008 depends largely on their use of Linux systems with the CONFIG_VMAP_STACK=y configuration and reliance on the DCP crypto driver for trusted key operations. The vulnerability can cause kernel crashes (denial of service) during encryption or decryption operations involving trusted keys, potentially disrupting critical services that depend on secure key management and cryptographic operations. This could affect servers, embedded devices, or specialized hardware running Linux kernels with this configuration. While the vulnerability does not directly lead to privilege escalation or data leakage, the resulting system instability or downtime could impact availability and operational continuity, especially in environments requiring high reliability such as financial institutions, healthcare, and critical infrastructure. Since no known exploits exist yet, the immediate risk is moderate, but organizations should prioritize patching to prevent potential future exploitation. The vulnerability also highlights the importance of secure kernel configuration and memory management in cryptographic subsystems.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Identify Linux systems running kernels with CONFIG_VMAP_STACK enabled and using the DCP crypto driver for trusted keys. 2) Apply the official Linux kernel patches that replace vmalloc'd stack buffers with kmalloc()-allocated buffers as soon as they become available from trusted Linux distributions or kernel maintainers. 3) If patching is not immediately possible, consider disabling CONFIG_VMAP_STACK or the DCP crypto driver if feasible and if it does not impact critical functionality, as a temporary mitigation. 4) Monitor system logs and kernel crash reports for signs of instability related to trusted key operations. 5) Implement robust kernel update and configuration management processes to ensure timely deployment of security fixes. 6) Engage with hardware and software vendors to confirm the impact on embedded devices or specialized Linux-based systems and coordinate patching efforts. 7) Conduct testing in controlled environments before deploying patches in production to avoid unintended disruptions.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-27T02:10:48.227Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9820c4522896dcbdd24e
Added to database: 5/21/2025, 9:08:48 AM
Last enriched: 6/27/2025, 11:09:29 PM
Last updated: 1/7/2026, 4:16:19 AM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.