CVE-2025-71147

5.5 MEDIUM

📋 TL;DR

This CVE describes a memory leak vulnerability in the Linux kernel's trusted keys subsystem. When the tpm2_load_cmd function fails to load a key, it doesn't properly free temporary memory allocations, potentially leading to kernel memory exhaustion. This affects Linux systems using the trusted keys subsystem with TPM2 hardware.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Specific affected versions not specified in CVE, but patches exist for multiple stable branches
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with trusted keys subsystem enabled and using TPM2 hardware. Most desktop/workstation systems with TPM2 chips are vulnerable if using the feature.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could trigger repeated failed key loading attempts to exhaust kernel memory, causing system instability, denial of service, or kernel panic.

🟠

Likely Case

Accidental or repeated failed key loading operations could gradually consume kernel memory, leading to system performance degradation or eventual crashes.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to potential performance issues from legitimate failed operations.

🌐 Internet-Facing: LOW - This vulnerability requires local access or privileged execution to trigger.
🏢 Internal Only: MEDIUM - Malicious insiders or compromised local accounts could exploit this to cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to trigger trusted key operations. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple stable kernel versions with fixes available (see references)

Vendor Advisory: https://git.kernel.org/stable/c/19166de9737218b77122c41a5730ac87025e089f

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify kernel version matches patched release.

🔧 Temporary Workarounds

Disable trusted keys subsystem

linux

Prevent use of the vulnerable trusted keys functionality

echo 'blacklist trusted' >> /etc/modprobe.d/blacklist.conf
rmmod trusted

Restrict trusted key operations

linux

Limit which users can perform trusted key operations

chmod 600 /sys/kernel/security/tpm*
setfacl -m u:root:rw /sys/kernel/security/tpm*

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized users from performing trusted key operations
  • Monitor kernel memory usage and system logs for signs of memory exhaustion or repeated failed key operations

🔍 How to Verify

Check if Vulnerable:

Check if trusted module is loaded: lsmod | grep trusted. Check kernel version against patched releases.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version matches patched release and trusted module functions correctly with test key operations.

📡 Detection & Monitoring

Log Indicators:

  • Kernel oom-killer messages
  • System memory exhaustion warnings
  • Failed trusted key operations in kernel logs

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

source="kernel" AND ("oom-killer" OR "Out of memory" OR "trusted: tpm2_load_cmd failed")

🔗 References

📤 Share & Export