{"id":"CVE-2024-58005","summary":"tpm: Change to kvalloc() in eventlog/acpi.c","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ntpm: Change to kvalloc() in eventlog/acpi.c\n\nThe following failure was reported on HPE ProLiant D320:\n\n[   10.693310][    T1] tpm_tis STM0925:00: 2.0 TPM (device-id 0x3, rev-id 0)\n[   10.848132][    T1] ------------[ cut here ]------------\n[   10.853559][    T1] WARNING: CPU: 59 PID: 1 at mm/page_alloc.c:4727 __alloc_pages_noprof+0x2ca/0x330\n[   10.862827][    T1] Modules linked in:\n[   10.866671][    T1] CPU: 59 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-lp155.2.g52785e2-default #1 openSUSE Tumbleweed (unreleased) 588cd98293a7c9eba9013378d807364c088c9375\n[   10.882741][    T1] Hardware name: HPE ProLiant DL320 Gen12/ProLiant DL320 Gen12, BIOS 1.20 10/28/2024\n[   10.892170][    T1] RIP: 0010:__alloc_pages_noprof+0x2ca/0x330\n[   10.898103][    T1] Code: 24 08 e9 4a fe ff ff e8 34 36 fa ff e9 88 fe ff ff 83 fe 0a 0f 86 b3 fd ff ff 80 3d 01 e7 ce 01 00 75 09 c6 05 f8 e6 ce 01 01 \u003c0f\u003e 0b 45 31 ff e9 e5 fe ff ff f7 c2 00 00 08 00 75 42 89 d9 80 e1\n[   10.917750][    T1] RSP: 0000:ffffb7cf40077980 EFLAGS: 00010246\n[   10.923777][    T1] RAX: 0000000000000000 RBX: 0000000000040cc0 RCX: 0000000000000000\n[   10.931727][    T1] RDX: 0000000000000000 RSI: 000000000000000c RDI: 0000000000040cc0\n\nThe above transcript shows that ACPI pointed a 16 MiB buffer for the log\nevents because RSI maps to the 'order' parameter of __alloc_pages_noprof().\nAddress the bug by moving from devm_kmalloc() to devm_add_action() and\nkvmalloc() and devm_add_action().","modified":"2026-04-02T12:25:28.159716Z","published":"2025-02-27T02:12:02.232Z","related":["ALSA-2025:20095","ALSA-2025:7423","SUSE-SU-2025:01600-1","SUSE-SU-2025:01919-1","SUSE-SU-2025:1177-1","SUSE-SU-2025:1178-1","SUSE-SU-2025:1180-1","SUSE-SU-2025:20190-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20260-1","SUSE-SU-2025:20270-1","USN-7521-2"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/58xxx/CVE-2024-58005.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0621d2599d6e02d05c85d6bbd58eaea2f15b3503"},{"type":"WEB","url":"https://git.kernel.org/stable/c/422d7f4e8d817be467986589c7968d3ea402f7da"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4c8bfe643bbd00b04ee8f9545ef33bf6a68c38db"},{"type":"WEB","url":"https://git.kernel.org/stable/c/50365a6304a57266e8f4d3078060743c3b7a1e0d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/77779d1258a287f2c5c2c6aeae203e0996209c77"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a3a860bc0fd6c07332e4911cf9a238d20de90173"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a676c0401de59548a5bc1b7aaf98f556ae8ea6db"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/58xxx/CVE-2024-58005.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-58005"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"55a82ab3181be039c6440d3f2f69260ad6fe2988"},{"fixed":"a676c0401de59548a5bc1b7aaf98f556ae8ea6db"},{"fixed":"0621d2599d6e02d05c85d6bbd58eaea2f15b3503"},{"fixed":"77779d1258a287f2c5c2c6aeae203e0996209c77"},{"fixed":"50365a6304a57266e8f4d3078060743c3b7a1e0d"},{"fixed":"422d7f4e8d817be467986589c7968d3ea402f7da"},{"fixed":"4c8bfe643bbd00b04ee8f9545ef33bf6a68c38db"},{"fixed":"a3a860bc0fd6c07332e4911cf9a238d20de90173"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-58005.json"}}],"schema_version":"1.7.5"}