CVE-2024-58005
📋 TL;DR
This CVE addresses a memory allocation vulnerability in the Linux kernel's TPM (Trusted Platform Module) event log handling. The issue occurs when the kernel attempts to allocate a 16 MiB buffer for ACPI event logs using kmalloc, which can fail on systems with memory constraints, potentially causing kernel warnings or system instability. Systems running affected Linux kernel versions with TPM enabled are vulnerable.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic or system crash due to failed memory allocation, leading to denial of service and potential data loss.
Likely Case
Kernel warning messages in system logs and potential system instability or performance degradation during TPM operations.
If Mitigated
Minor performance impact during TPM event log processing with proper memory allocation.
🎯 Exploit Status
This appears to be a reliability/DoS issue rather than a security vulnerability with privilege escalation or code execution capabilities. The CVSS score of 5.5 suggests moderate impact.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel commits: 0621d2599d6e02d05c85d6bbd58eaea2f15b3503, 422d7f4e8d817be467986589c7968d3ea402f7da, 4c8bfe643bbd00b04ee8f9545ef33bf6a68c38db, 50365a6304a57266e8f4d3078060743c3b7a1e0d, 77779d1258a287f2c5c2c6aeae203e0996209c77
Vendor Advisory: https://git.kernel.org/stable/c/0621d2599d6e02d05c85d6bbd58eaea2f15b3503
Restart Required: Yes
Instructions:
1. Update to a kernel version containing the fix commits. 2. Check your distribution's security advisories for backported patches. 3. Reboot the system after kernel update.
🔧 Temporary Workarounds
Disable TPM event logging
linuxPrevent the vulnerable code path by disabling TPM event logging in ACPI
echo 0 > /sys/kernel/security/tpm/eventlog
Note: This may reduce TPM functionality and logging capabilities
🧯 If You Can't Patch
- Monitor system logs for TPM-related allocation warnings and restart affected services if instability occurs
- Ensure adequate system memory is available to reduce likelihood of allocation failures
🔍 How to Verify
Check if Vulnerable:
Check kernel version and look for TPM allocation warnings in dmesg: dmesg | grep -i "tpm\|alloc_pages"
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commits: grep -r "0621d2599d6e02d05c85d6bbd58eaea2f15b3503" /boot/System.map* || uname -r
📡 Detection & Monitoring
Log Indicators:
- WARNING: CPU: PID: at mm/page_alloc.c:4727 __alloc_pages_noprof
- tpm_tis.*TPM.*device-id
- ACSI pointed a 16 MiB buffer for the log events
Network Indicators:
- None - this is a local memory allocation issue
SIEM Query:
source="kernel" AND ("__alloc_pages_noprof" OR "tpm_tis" OR "16 MiB buffer")
🔗 References
- https://git.kernel.org/stable/c/0621d2599d6e02d05c85d6bbd58eaea2f15b3503
- https://git.kernel.org/stable/c/422d7f4e8d817be467986589c7968d3ea402f7da
- https://git.kernel.org/stable/c/4c8bfe643bbd00b04ee8f9545ef33bf6a68c38db
- https://git.kernel.org/stable/c/50365a6304a57266e8f4d3078060743c3b7a1e0d
- https://git.kernel.org/stable/c/77779d1258a287f2c5c2c6aeae203e0996209c77
- https://git.kernel.org/stable/c/a3a860bc0fd6c07332e4911cf9a238d20de90173
- https://git.kernel.org/stable/c/a676c0401de59548a5bc1b7aaf98f556ae8ea6db
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html