CVE-2024-49851

In the Linux kernel, the following vulnerability has been resolved: tpm: Clean up TPM space after command failure tpm_dev_transmit prepares the TPM space before attempting command transmission. However if the command fails no rollback of this preparation is done. This can result in transient handles being leaked if the device is subsequently closed with no further commands performed. Fix this by flushing the space in the event of command transmission failure.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

08 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/87e8134c18977b566f4ec248c8a147244da69402 -

23 Oct 2024, 16:00

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tpm: Limpiar el espacio TPM después de un error de comando tpm_dev_transmit prepara el espacio TPM antes de intentar la transmisión del comando. Sin embargo, si el comando falla, no se realiza ninguna reversión de esta preparación. Esto puede provocar que se filtren los identificadores transitorios si el dispositivo se cierra posteriormente sin que se realicen más comandos. Solucione esto vaciando el espacio en caso de que falle la transmisión del comando.
References () https://git.kernel.org/stable/c/2c9b228938e9266a1065a3f4fe5c99b7235dc439 - () https://git.kernel.org/stable/c/2c9b228938e9266a1065a3f4fe5c99b7235dc439 - Patch
References () https://git.kernel.org/stable/c/3f9f72d843c92fb6f4ff7460d774413cde7f254c - () https://git.kernel.org/stable/c/3f9f72d843c92fb6f4ff7460d774413cde7f254c - Patch
References () https://git.kernel.org/stable/c/82478cb8a23bd4f97935bbe60d64528c6d9918b4 - () https://git.kernel.org/stable/c/82478cb8a23bd4f97935bbe60d64528c6d9918b4 - Patch
References () https://git.kernel.org/stable/c/adf4ce162561222338cf2c9a2caa294527f7f721 - () https://git.kernel.org/stable/c/adf4ce162561222338cf2c9a2caa294527f7f721 - Patch
References () https://git.kernel.org/stable/c/c84ceb546f30432fccea4891163f7050f5bee5dd - () https://git.kernel.org/stable/c/c84ceb546f30432fccea4891163f7050f5bee5dd - Patch
References () https://git.kernel.org/stable/c/e3aaebcbb7c6b403416f442d1de70d437ce313a7 - () https://git.kernel.org/stable/c/e3aaebcbb7c6b403416f442d1de70d437ce313a7 - Patch
References () https://git.kernel.org/stable/c/ebc4e1f4492d114f9693950621b3ea42b2f82bec - () https://git.kernel.org/stable/c/ebc4e1f4492d114f9693950621b3ea42b2f82bec - Patch
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-459
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 Oct 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 13:15

Updated : 2024-11-08 16:15


NVD link : CVE-2024-49851

Mitre link : CVE-2024-49851

CVE.ORG link : CVE-2024-49851


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-459

Incomplete Cleanup