VYPR
Medium severity5.5NVD Advisory· Published Feb 27, 2025· Updated May 12, 2026

CVE-2024-58005

CVE-2024-58005

Description

In the Linux kernel, the following vulnerability has been resolved:

tpm: Change to kvalloc() in eventlog/acpi.c

The following failure was reported on HPE ProLiant D320:

[ 10.693310][ T1] tpm_tis STM0925:00: 2.0 TPM (device-id 0x3, rev-id 0) [ 10.848132][ T1] ------------[ cut here ]------------ [ 10.853559][ T1] WARNING: CPU: 59 PID: 1 at mm/page_alloc.c:4727 __alloc_pages_noprof+0x2ca/0x330 [ 10.862827][ T1] Modules linked in: [ 10.866671][ T1] CPU: 59 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-lp155.2.g52785e2-default #1 openSUSE Tumbleweed (unreleased) 588cd98293a7c9eba9013378d807364c088c9375 [ 10.882741][ T1] Hardware name: HPE ProLiant DL320 Gen12/ProLiant DL320 Gen12, BIOS 1.20 10/28/2024 [ 10.892170][ T1] RIP: 0010:__alloc_pages_noprof+0x2ca/0x330 [ 10.898103][ T1] Code: 24 08 e9 4a fe ff ff e8 34 36 fa ff e9 88 fe ff ff 83 fe 0a 0f 86 b3 fd ff ff 80 3d 01 e7 ce 01 00 75 09 c6 05 f8 e6 ce 01 01 <0f> 0b 45 31 ff e9 e5 fe ff ff f7 c2 00 00 08 00 75 42 89 d9 80 e1 [ 10.917750][ T1] RSP: 0000:ffffb7cf40077980 EFLAGS: 00010246 [ 10.923777][ T1] RAX: 0000000000000000 RBX: 0000000000040cc0 RCX: 0000000000000000 [ 10.931727][ T1] RDX: 0000000000000000 RSI: 000000000000000c RDI: 0000000000040cc0

The above transcript shows that ACPI pointed a 16 MiB buffer for the log events because RSI maps to the 'order' parameter of __alloc_pages_noprof(). Address the bug by moving from devm_kmalloc() to devm_add_action() and kvmalloc() and devm_add_action().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A kernel memory allocation failure in the TPM eventlog subsystem (ACPI path) causes a system warning on HPE ProLiant DL320 Gen12, fixed by switching from kmalloc to kvalloc.

Vulnerability

Description

CVE-2024-58005 is a Linux kernel bug in the TPM (Trusted Platform Module) eventlog ACPI handling code. When the system boots, the ACPI table may report a very large event log buffer — in the reported case on HPE ProLiant DL320 Gen12, up to 16 MiB. The original code used devm_kmalloc() which internally calls __alloc_pages_noprof() with an order derived from the buffer size. For a 16 MiB allocation, the required order (11) exceeds the maximum order (10) that the page allocator can satisfy from the buddy allocator. This triggers a WARN_ON and a stack trace, as seen in the kernel logs [4].

Exploitation and

Impact

The bug is triggered during TPM initialization on systems with ACPI-provided TPM2 event logs exceeding ~4 MiB (the system's maximum contiguous page allocation). No special attacker access is needed — the issue occurs at boot time on affected hardware. While not directly exploitable by an unprivileged user, the WARNING and potential allocation failure could prevent the TPM subsystem from initializing properly, leading to degraded security features (e.g., measured boot, remote attestation) that depend on a fully functional TPM event log [4].

Remediation

The fix replaces devm_kmalloc() with kvmalloc() (which can fall back to vmalloc for large allocations) and uses devm_add_action() for proper cleanup. The patch was committed to the Linux kernel stable tree and is included in subsequent updates. Siemens notes that SIMATIC S7-1500 TM MFP devices running a GNU/Linux subsystem are affected by this CVE among many others, and recommends following their security advisory workarounds (SSA-265688) [1]. Similarly, SIMATIC S7-1500 CPU family devices are listed as affected in SSA-082556 [2], and the BIOS of the TM MFP is covered under SSA-503939 [3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

149

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

12

News mentions

0

No linked articles in our index yet.