VULNERABILITY

Ubuntu: (Multiple Advisories) (CVE-2024-58005): Linux kernel vulnerabilities

Try Surface Command Get a continuous 360° view of your attack surface
Back to Search

Ubuntu: (Multiple Advisories) (CVE-2024-58005): Linux kernel vulnerabilities

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
02/27/2025
Created
05/21/2025
Added
05/20/2025
Modified
05/22/2025

Description

In the Linux kernel, the following vulnerability has been resolved: tpm: Change to kvalloc() in eventlog/acpi.c The following failure was reported on HPE ProLiant D320: [ 10.693310][ T1] tpm_tis STM0925:00: 2.0 TPM (device-id 0x3, rev-id 0) [ 10.848132][ T1] ------------[ cut here ]------------ [ 10.853559][ T1] WARNING: CPU: 59 PID: 1 at mm/page_alloc.c:4727 __alloc_pages_noprof+0x2ca/0x330 [ 10.862827][ T1] Modules linked in: [ 10.866671][ T1] CPU: 59 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-lp155.2.g52785e2-default #1 openSUSE Tumbleweed (unreleased) 588cd98293a7c9eba9013378d807364c088c9375 [ 10.882741][ T1] Hardware name: HPE ProLiant DL320 Gen12/ProLiant DL320 Gen12, BIOS 1.20 10/28/2024 [ 10.892170][ T1] RIP: 0010:__alloc_pages_noprof+0x2ca/0x330 [ 10.898103][ T1] Code: 24 08 e9 4a fe ff ff e8 34 36 fa ff e9 88 fe ff ff 83 fe 0a 0f 86 b3 fd ff ff 80 3d 01 e7 ce 01 00 75 09 c6 05 f8 e6 ce 01 01 <0f> 0b 45 31 ff e9 e5 fe ff ff f7 c2 00 00 08 00 75 42 89 d9 80 e1 [ 10.917750][ T1] RSP: 0000:ffffb7cf40077980 EFLAGS: 00010246 [ 10.923777][ T1] RAX: 0000000000000000 RBX: 0000000000040cc0 RCX: 0000000000000000 [ 10.931727][ T1] RDX: 0000000000000000 RSI: 000000000000000c RDI: 0000000000040cc0 The above transcript shows that ACPI pointed a 16 MiB buffer for the log events because RSI maps to the 'order' parameter of __alloc_pages_noprof(). Address the bug by moving from devm_kmalloc() to devm_add_action() and kvmalloc() and devm_add_action().

Solution(s)

  • ubuntu-upgrade-linux-image-5-15-0-1037-nvidia-tegra
  • ubuntu-upgrade-linux-image-5-15-0-1037-nvidia-tegra-rt
  • ubuntu-upgrade-linux-image-5-15-0-1066-gkeop
  • ubuntu-upgrade-linux-image-5-15-0-1076-ibm
  • ubuntu-upgrade-linux-image-5-15-0-1077-intel-iot-realtime
  • ubuntu-upgrade-linux-image-5-15-0-1078-nvidia
  • ubuntu-upgrade-linux-image-5-15-0-1078-nvidia-lowlatency
  • ubuntu-upgrade-linux-image-5-15-0-1079-intel-iotg
  • ubuntu-upgrade-linux-image-5-15-0-1080-kvm
  • ubuntu-upgrade-linux-image-5-15-0-1081-gke
  • ubuntu-upgrade-linux-image-5-15-0-1081-oracle
  • ubuntu-upgrade-linux-image-5-15-0-1083-gcp
  • ubuntu-upgrade-linux-image-5-15-0-1083-gcp-fips
  • ubuntu-upgrade-linux-image-5-15-0-1084-realtime
  • ubuntu-upgrade-linux-image-5-15-0-1089-azure
  • ubuntu-upgrade-linux-image-5-15-0-1089-azure-fips
  • ubuntu-upgrade-linux-image-5-15-0-140-fips
  • ubuntu-upgrade-linux-image-5-15-0-140-generic
  • ubuntu-upgrade-linux-image-5-15-0-140-generic-64k
  • ubuntu-upgrade-linux-image-5-15-0-140-generic-lpae
  • ubuntu-upgrade-linux-image-5-15-0-140-lowlatency
  • ubuntu-upgrade-linux-image-5-15-0-140-lowlatency-64k
  • ubuntu-upgrade-linux-image-6-11-0-1010-realtime
  • ubuntu-upgrade-linux-image-6-11-0-1013-raspi
  • ubuntu-upgrade-linux-image-6-11-0-1015-azure
  • ubuntu-upgrade-linux-image-6-11-0-1015-azure-fde
  • ubuntu-upgrade-linux-image-6-11-0-1015-gcp
  • ubuntu-upgrade-linux-image-6-11-0-1015-gcp-64k
  • ubuntu-upgrade-linux-image-6-11-0-1022-oem
  • ubuntu-upgrade-linux-image-6-11-0-26-generic
  • ubuntu-upgrade-linux-image-6-11-0-26-generic-64k
  • ubuntu-upgrade-linux-image-azure
  • ubuntu-upgrade-linux-image-azure-cvm
  • ubuntu-upgrade-linux-image-azure-fde
  • ubuntu-upgrade-linux-image-azure-fips
  • ubuntu-upgrade-linux-image-azure-lts-22-04
  • ubuntu-upgrade-linux-image-fips
  • ubuntu-upgrade-linux-image-gcp
  • ubuntu-upgrade-linux-image-gcp-64k
  • ubuntu-upgrade-linux-image-gcp-fips
  • ubuntu-upgrade-linux-image-gcp-lts-22-04
  • ubuntu-upgrade-linux-image-generic
  • ubuntu-upgrade-linux-image-generic-64k
  • ubuntu-upgrade-linux-image-generic-64k-hwe-24-04
  • ubuntu-upgrade-linux-image-generic-hwe-24-04
  • ubuntu-upgrade-linux-image-generic-lpae
  • ubuntu-upgrade-linux-image-gke
  • ubuntu-upgrade-linux-image-gke-5-15
  • ubuntu-upgrade-linux-image-gkeop
  • ubuntu-upgrade-linux-image-gkeop-5-15
  • ubuntu-upgrade-linux-image-ibm
  • ubuntu-upgrade-linux-image-intel-iot-realtime
  • ubuntu-upgrade-linux-image-intel-iotg
  • ubuntu-upgrade-linux-image-kvm
  • ubuntu-upgrade-linux-image-lowlatency
  • ubuntu-upgrade-linux-image-lowlatency-64k
  • ubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04
  • ubuntu-upgrade-linux-image-lowlatency-hwe-20-04
  • ubuntu-upgrade-linux-image-nvidia
  • ubuntu-upgrade-linux-image-nvidia-lowlatency
  • ubuntu-upgrade-linux-image-nvidia-tegra
  • ubuntu-upgrade-linux-image-nvidia-tegra-rt
  • ubuntu-upgrade-linux-image-oem-24-04b
  • ubuntu-upgrade-linux-image-oracle
  • ubuntu-upgrade-linux-image-oracle-lts-22-04
  • ubuntu-upgrade-linux-image-raspi
  • ubuntu-upgrade-linux-image-realtime
  • ubuntu-upgrade-linux-image-virtual
  • ubuntu-upgrade-linux-image-virtual-hwe-24-04

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;