CVE-2024-53085

MEDIUM

Linux Kernel < 6.11.8 - Improper Locking

Title source: rule
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: tpm: Lock TPM chip in tpm_pm_suspend() first Setting TPM_CHIP_FLAG_SUSPENDED in the end of tpm_pm_suspend() can be racy according, as this leaves window for tpm_hwrng_read() to be called while the operation is in progress. The recent bug report gives also evidence of this behaviour. Aadress this by locking the TPM chip before checking any chip->flags both in tpm_pm_suspend() and tpm_hwrng_read(). Move TPM_CHIP_FLAG_SUSPENDED check inside tpm_get_random() so that it will be always checked only when the lock is reserved.

Scores

CVSS v3 5.5
EPSS 0.0002
EPSS Percentile 3.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-667
Status published
Products (4)
linux/Kernel 6.4.0 - 6.6.64linux
linux/Kernel 6.7.0 - 6.11.8linux
linux/linux_kernel 6.12 rc1 (6 CPE variants)
linux/linux_kernel 6.4 - 6.11.8
Published Nov 19, 2024
Tracked Since Feb 18, 2026