VYPR
Medium severity5.5NVD Advisory· Published Mar 6, 2025· Updated May 12, 2026

CVE-2024-58085

CVE-2024-58085

Description

In the Linux kernel, the following vulnerability has been resolved:

tomoyo: don't emit warning in tomoyo_write_control()

syzbot is reporting too large allocation warning at tomoyo_write_control(), for one can write a very very long line without new line character. To fix this warning, I use __GFP_NOWARN rather than checking for KMALLOC_MAX_SIZE, for practically a valid line should be always shorter than 32KB where the "too small to fail" memory-allocation rule applies.

One might try to write a valid line that is longer than 32KB, but such request will likely fail with -ENOMEM. Therefore, I feel that separately returning -EINVAL when a line is longer than KMALLOC_MAX_SIZE is redundant. There is no need to distinguish over-32KB and over-KMALLOC_MAX_SIZE.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's tomoyo module, a local attacker can cause a large allocation warning by writing a very long line; the fix uses __GFP_NOWARN to suppress it.

Vulnerability

Details

CVE-2024-58085 is a vulnerability in the Linux kernel's TOMOYO Linux security module. The function tomoyo_write_control() can be made to allocate a very large buffer when a user writes an extremely long line without a newline character. This triggers a "too large allocation" warning from the kernel's memory allocator, which can be observed in system logs and may lead to a denial-of-service condition due to excessive memory pressure or warning messages.

Exploitation

The vulnerability is exploitable locally by any user or process that can write to the TOMOYO control interface (typically /sys/kernel/security/tomoyo/). No special privileges are required beyond the ability to write to that interface. An attacker can craft a long input string without newlines to force the kernel to attempt a large memory allocation, causing the warning to be emitted.

Impact

The primary impact is a local denial of service through kernel warning messages and potential memory allocation failures. The CVSS v3 score of 5.5 (Medium) reflects the local attack vector and the availability impact. The Siemens advisory [1] confirms that this CVE affects the SIMATIC S7-1500 TM MFP - GNU/Linux subsystem, among many other CVEs.

Mitigation

The fix, applied in the Linux kernel stable tree, replaces the allocation with __GFP_NOWARN to suppress the warning, as the line length is practically limited to 32KB by the "too small to fail" rule. Users should update their kernel to a version containing the commit that addresses this issue. For affected Siemens products, refer to the advisory [1] for remediation guidance.

References
  1. SSA-265688

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

64

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

11

News mentions

0

No linked articles in our index yet.