CVE-2024-58005

Source
https://cve.org/CVERecord?id=CVE-2024-58005
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-58005.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-58005
Downstream
Related
Published
2025-02-27T02:12:02.232Z
Modified
2026-03-20T12:41:05.570488Z
Summary
tpm: Change to kvalloc() in eventlog/acpi.c
Details

In the Linux kernel, the following vulnerability has been resolved:

tpm: Change to kvalloc() in eventlog/acpi.c

The following failure was reported on HPE ProLiant D320:

[ 10.693310][ T1] tpmtis STM0925:00: 2.0 TPM (device-id 0x3, rev-id 0) [ 10.848132][ T1] ------------[ cut here ]------------ [ 10.853559][ T1] WARNING: CPU: 59 PID: 1 at mm/pagealloc.c:4727 __allocpagesnoprof+0x2ca/0x330 [ 10.862827][ T1] Modules linked in: [ 10.866671][ T1] CPU: 59 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-lp155.2.g52785e2-default #1 openSUSE Tumbleweed (unreleased) 588cd98293a7c9eba9013378d807364c088c9375 [ 10.882741][ T1] Hardware name: HPE ProLiant DL320 Gen12/ProLiant DL320 Gen12, BIOS 1.20 10/28/2024 [ 10.892170][ T1] RIP: 0010:__allocpagesnoprof+0x2ca/0x330 [ 10.898103][ T1] Code: 24 08 e9 4a fe ff ff e8 34 36 fa ff e9 88 fe ff ff 83 fe 0a 0f 86 b3 fd ff ff 80 3d 01 e7 ce 01 00 75 09 c6 05 f8 e6 ce 01 01 <0f> 0b 45 31 ff e9 e5 fe ff ff f7 c2 00 00 08 00 75 42 89 d9 80 e1 [ 10.917750][ T1] RSP: 0000:ffffb7cf40077980 EFLAGS: 00010246 [ 10.923777][ T1] RAX: 0000000000000000 RBX: 0000000000040cc0 RCX: 0000000000000000 [ 10.931727][ T1] RDX: 0000000000000000 RSI: 000000000000000c RDI: 0000000000040cc0

The above transcript shows that ACPI pointed a 16 MiB buffer for the log events because RSI maps to the 'order' parameter of _allocpagesnoprof(). Address the bug by moving from devmkmalloc() to devmaddaction() and kvmalloc() and devmaddaction().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/58xxx/CVE-2024-58005.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
55a82ab3181be039c6440d3f2f69260ad6fe2988
Fixed
a676c0401de59548a5bc1b7aaf98f556ae8ea6db
Fixed
0621d2599d6e02d05c85d6bbd58eaea2f15b3503
Fixed
77779d1258a287f2c5c2c6aeae203e0996209c77
Fixed
50365a6304a57266e8f4d3078060743c3b7a1e0d
Fixed
422d7f4e8d817be467986589c7968d3ea402f7da
Fixed
4c8bfe643bbd00b04ee8f9545ef33bf6a68c38db
Fixed
a3a860bc0fd6c07332e4911cf9a238d20de90173

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-58005.json"