First published: Tue Nov 19 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: tpm: Lock TPM chip in tpm_pm_suspend() first Setting TPM_CHIP_FLAG_SUSPENDED in the end of tpm_pm_suspend() can be racy according, as this leaves window for tpm_hwrng_read() to be called while the operation is in progress. The recent bug report gives also evidence of this behaviour. Aadress this by locking the TPM chip before checking any chip->flags both in tpm_pm_suspend() and tpm_hwrng_read(). Move TPM_CHIP_FLAG_SUSPENDED check inside tpm_get_random() so that it will be always checked only when the lock is reserved.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.4<6.11.8 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 | |
Linux Kernel | =6.12-rc5 | |
Linux Kernel | =6.12-rc6 | |
debian/linux | <=6.1.123-1<=6.1.128-1 | 5.10.223-1 5.10.226-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53085 is rated as a medium severity vulnerability due to the potential for race conditions in the TPM handling code.
To fix CVE-2024-53085, update the Linux kernel to a version that is 6.12-rc7 or later, or apply the appropriate patches provided by kernel maintainers.
CVE-2024-53085 affects Linux kernel versions from 6.4 to 6.11.8 and specific 6.12 release candidates.
CVE-2024-53085 impacts the TPM (Trusted Platform Module) handling in the Linux kernel.
Yes, CVE-2024-53085 may be exploitable in production environments if the affected kernel versions are in use and TPM functionality is enabled.