CVE-2024-58075: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: crypto: tegra - do not transfer req when tegra init fails The tegra_cmac_init or tegra_sha_init function may return an error when memory is exhausted. It should not transfer the request when they return an error.
AI Analysis
Technical Summary
CVE-2024-58075 is a vulnerability identified in the Linux kernel's cryptographic subsystem, specifically within the Tegra platform's crypto driver. The issue arises in the initialization functions tegra_cmac_init and tegra_sha_init, which are responsible for setting up cryptographic operations using CMAC and SHA algorithms on NVIDIA Tegra hardware. When these initialization functions fail due to memory exhaustion, the Linux kernel erroneously proceeds to transfer cryptographic requests despite the failed initialization. This improper handling can lead to undefined behavior, potentially causing kernel instability or crashes. The root cause is the lack of proper error checking before transferring requests, which violates expected control flow and resource management in the kernel's crypto framework. Although no known exploits are currently reported in the wild, the vulnerability represents a risk because it affects the kernel's cryptographic operations on Tegra devices, which are commonly used in embedded systems, automotive platforms, and IoT devices running Linux. The affected versions are identified by specific commit hashes, indicating the vulnerability is present in certain kernel builds prior to the patch. The absence of a CVSS score suggests this is a newly disclosed issue, and the Linux maintainers have published the fix to prevent improper request handling when initialization fails.
Potential Impact
For European organizations, the impact of CVE-2024-58075 depends largely on the deployment of Linux systems running on NVIDIA Tegra hardware. Such hardware is prevalent in embedded systems, automotive infotainment, industrial control systems, and IoT devices. If exploited, the vulnerability could lead to kernel crashes or denial of service conditions, affecting system availability and potentially causing operational disruptions. In critical infrastructure sectors such as automotive manufacturing, transportation, and industrial automation—where Tegra-based Linux systems may be integrated—this could translate into safety risks or downtime. Confidentiality and integrity impacts are less direct but cannot be entirely ruled out if kernel instability is leveraged as part of a broader attack chain. Given the kernel-level nature of the flaw, successful exploitation could allow attackers to disrupt services or cause system reboots, impacting business continuity. However, the lack of known exploits and the requirement for specific hardware limits the immediate threat scope. European organizations using Tegra-based Linux systems should assess their exposure, especially in sectors relying on embedded Linux devices.
Mitigation Recommendations
To mitigate CVE-2024-58075, organizations should promptly apply the official Linux kernel patches that address the improper request transfer in the Tegra crypto driver. This involves updating to kernel versions that include the fix or backporting the patch if using long-term support kernels. System administrators should audit their environments to identify Linux systems running on NVIDIA Tegra hardware and verify the kernel versions in use. For embedded and IoT devices where kernel updates may be challenging, vendors should be engaged to provide firmware updates incorporating the fix. Additionally, monitoring system logs for unusual kernel errors or crashes related to cryptographic operations can help detect attempts to trigger this vulnerability. Employing memory resource monitoring and limiting resource exhaustion scenarios can reduce the likelihood of initialization failures. Finally, implementing defense-in-depth strategies such as kernel lockdown features and restricting access to privileged operations can further reduce exploitation risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2024-58075: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: crypto: tegra - do not transfer req when tegra init fails The tegra_cmac_init or tegra_sha_init function may return an error when memory is exhausted. It should not transfer the request when they return an error.
AI-Powered Analysis
Technical Analysis
CVE-2024-58075 is a vulnerability identified in the Linux kernel's cryptographic subsystem, specifically within the Tegra platform's crypto driver. The issue arises in the initialization functions tegra_cmac_init and tegra_sha_init, which are responsible for setting up cryptographic operations using CMAC and SHA algorithms on NVIDIA Tegra hardware. When these initialization functions fail due to memory exhaustion, the Linux kernel erroneously proceeds to transfer cryptographic requests despite the failed initialization. This improper handling can lead to undefined behavior, potentially causing kernel instability or crashes. The root cause is the lack of proper error checking before transferring requests, which violates expected control flow and resource management in the kernel's crypto framework. Although no known exploits are currently reported in the wild, the vulnerability represents a risk because it affects the kernel's cryptographic operations on Tegra devices, which are commonly used in embedded systems, automotive platforms, and IoT devices running Linux. The affected versions are identified by specific commit hashes, indicating the vulnerability is present in certain kernel builds prior to the patch. The absence of a CVSS score suggests this is a newly disclosed issue, and the Linux maintainers have published the fix to prevent improper request handling when initialization fails.
Potential Impact
For European organizations, the impact of CVE-2024-58075 depends largely on the deployment of Linux systems running on NVIDIA Tegra hardware. Such hardware is prevalent in embedded systems, automotive infotainment, industrial control systems, and IoT devices. If exploited, the vulnerability could lead to kernel crashes or denial of service conditions, affecting system availability and potentially causing operational disruptions. In critical infrastructure sectors such as automotive manufacturing, transportation, and industrial automation—where Tegra-based Linux systems may be integrated—this could translate into safety risks or downtime. Confidentiality and integrity impacts are less direct but cannot be entirely ruled out if kernel instability is leveraged as part of a broader attack chain. Given the kernel-level nature of the flaw, successful exploitation could allow attackers to disrupt services or cause system reboots, impacting business continuity. However, the lack of known exploits and the requirement for specific hardware limits the immediate threat scope. European organizations using Tegra-based Linux systems should assess their exposure, especially in sectors relying on embedded Linux devices.
Mitigation Recommendations
To mitigate CVE-2024-58075, organizations should promptly apply the official Linux kernel patches that address the improper request transfer in the Tegra crypto driver. This involves updating to kernel versions that include the fix or backporting the patch if using long-term support kernels. System administrators should audit their environments to identify Linux systems running on NVIDIA Tegra hardware and verify the kernel versions in use. For embedded and IoT devices where kernel updates may be challenging, vendors should be engaged to provide firmware updates incorporating the fix. Additionally, monitoring system logs for unusual kernel errors or crashes related to cryptographic operations can help detect attempts to trigger this vulnerability. Employing memory resource monitoring and limiting resource exhaustion scenarios can reduce the likelihood of initialization failures. Finally, implementing defense-in-depth strategies such as kernel lockdown features and restricting access to privileged operations can further reduce exploitation risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-03-06T15:52:09.182Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9822c4522896dcbde2e9
Added to database: 5/21/2025, 9:08:50 AM
Last enriched: 6/28/2025, 5:56:09 AM
Last updated: 8/15/2025, 10:17:54 AM
Views: 14
Related Threats
CVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52619: CWE-209 Generation of Error Message Containing Sensitive Information in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52618: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in HCL Software BigFix SaaS Remediate
MediumCVE-2025-43201: An app may be able to unexpectedly leak a user's credentials in Apple Apple Music Classical for Android
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.