CVE-2022-49286

In the Linux kernel, the following vulnerability has been resolved: tpm: use try_get_ops() in tpm-space.c As part of the series conversion to remove nested TPM operations: https://lore.kernel.org/all/20190205224723.19671-1-jarkko.sakkinen@linux.intel.com/ exposure of the chip->tpm_mutex was removed from much of the upper level code. In this conversion, tpm2_del_space() was missed. This didn't matter much because it's usually called closely after a converted operation, so there's only a very tiny race window where the chip can be removed before the space flushing is done which causes a NULL deref on the mutex. However, there are reports of this window being hit in practice, so fix this by converting tpm2_del_space() to use tpm_try_get_ops(), which performs all the teardown checks before acquring the mutex.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:*:*:*:*:*:*:*

History

22 Sep 2025, 19:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:*:*:*:*:*:*:*
CWE CWE-476
First Time Linux linux Kernel
Linux
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tpm: uso try_get_ops() en tpm-space.c Como parte de la conversión en serie para eliminar las operaciones TPM anidadas: https://lore.kernel.org/all/20190205224723.19671-1-jarkko.sakkinen@linux.intel.com/ se eliminó la exposición del chip->tpm_mutex de gran parte del código de nivel superior. En esta conversión, se pasó por alto tpm2_del_space(). Esto no importó mucho porque generalmente se llama poco después de una operación convertida, por lo que solo hay una ventana de ejecución muy pequeña donde se puede quitar el chip antes de que se realice el vaciado de espacio, lo que provoca una desreferencia NULL en el mutex. Sin embargo, hay informes de que esta ventana se alcanza en la práctica, así que solucione esto convirtiendo tpm2_del_space() para usar tpm_try_get_ops(), que realiza todas las comprobaciones de desmontaje antes de adquirir el mutex.
References () https://git.kernel.org/stable/c/476ddd23f818fb94cf86fb5617f3bb9a7c92113d - () https://git.kernel.org/stable/c/476ddd23f818fb94cf86fb5617f3bb9a7c92113d - Patch
References () https://git.kernel.org/stable/c/5b1d2561a03e534064b51c50c774657833d3d2cf - () https://git.kernel.org/stable/c/5b1d2561a03e534064b51c50c774657833d3d2cf - Patch
References () https://git.kernel.org/stable/c/95193d12f10a8a088843b25e0f5fe1d83ec6b079 - () https://git.kernel.org/stable/c/95193d12f10a8a088843b25e0f5fe1d83ec6b079 - Patch
References () https://git.kernel.org/stable/c/ba84f9a48366dcc3cdef978599433efe101dd5bd - () https://git.kernel.org/stable/c/ba84f9a48366dcc3cdef978599433efe101dd5bd - Patch
References () https://git.kernel.org/stable/c/eda1662cce964c8a65bb86321f8d9cfa6e9ceaab - () https://git.kernel.org/stable/c/eda1662cce964c8a65bb86321f8d9cfa6e9ceaab - Patch
References () https://git.kernel.org/stable/c/fb5abce6b2bb5cb3d628aaa63fa821da8c4600f9 - () https://git.kernel.org/stable/c/fb5abce6b2bb5cb3d628aaa63fa821da8c4600f9 - Patch

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-09-22 19:35


NVD link : CVE-2022-49286

Mitre link : CVE-2022-49286

CVE.ORG link : CVE-2022-49286


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference