
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-53085 affects the Linux kernel's TPM (Trusted Platform Module) driver implementation. The vulnerability was discovered in the tpm_pm_suspend() function where setting TPM_CHIP_FLAG_SUSPENDED at the end of the function can lead to a race condition. This allows tpm_hwrng_read() to be called while the operation is in progress. The vulnerability affects Linux kernel versions from 6.4 up to (excluding) 6.11.8 (NVD).
The vulnerability stems from a race condition in the TPM driver's suspend functionality. The issue occurs because TPM_CHIP_FLAG_SUSPENDED is set at the end of tpm_pm_suspend(), leaving a window where tpm_hwrng_read() can be called during the suspension process. The CVSS v3.1 base score is 5.5 (MEDIUM) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H. The vulnerability is classified as CWE-667: Improper Locking (NVD, Kernel Patch).
The vulnerability can lead to undefined behavior when the TPM chip is being suspended while random number generation operations are in progress. This could potentially result in system instability or denial of service conditions during system suspend operations (Kernel Patch).
The issue has been fixed by modifying the locking mechanism in the TPM driver. The fix involves locking the TPM chip before checking any chip->flags in both tpm_pm_suspend() and tpm_hwrng_read() functions, and moving the TPM_CHIP_FLAG_SUSPENDED check inside tpm_get_random(). Users should update to kernel version 6.11.8 or later to receive the fix (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."