CVE-2023-54073
Use-After-Free Vulnerability in Linux TPM Driver Causes Kernel Crash
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's TPM (Trusted Platform Module) driver where a missing check (!tpm_amd_is_rng_defective()) in the hwrng_unregister() function could lead to a kernel crash due to list corruption. Specifically, the issue causes a kernel BUG triggered by invalid list operations during hardware random number generator unregistration in TPM chip removal.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel panic) when the TPM hardware random number generator is unregistered improperly. This can lead to system instability or downtime, potentially affecting system availability and reliability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for kernel crash messages similar to the following: 'list_del corruption, ... kernel BUG at lib/list_debug.c:49!' and related call traces involving hwrng_unregister and tpm_chip_unregister. You can check the kernel logs using the command: dmesg | grep -i 'list_del corruption' or dmesg | grep -i 'kernel BUG'. Additionally, monitoring for crashes related to TPM or RNG modules may help detect this issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the fix adding the !tpm_amd_is_rng_defective() check to the hwrng_unregister() call site inside tpm_chip_unregister(). Until the update is applied, monitoring for kernel crashes and avoiding operations that trigger TPM RNG unregistering may reduce risk.