Bug 2320246 (CVE-2024-49851) - CVE-2024-49851 kernel: tpm: Clean up TPM space after command failure
Summary: CVE-2024-49851 kernel: tpm: Clean up TPM space after command failure
Keywords:
Status: NEW
Alias: CVE-2024-49851
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2320375
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-10-21 13:05 UTC by OSIDB Bzimport
Modified: 2025-05-13 08:29 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:6966 0 None None None 2025-05-13 08:29:22 UTC

Description OSIDB Bzimport 2024-10-21 13:05:10 UTC
In the Linux kernel, the following vulnerability has been resolved:

tpm: Clean up TPM space after command failure

tpm_dev_transmit prepares the TPM space before attempting command
transmission. However if the command fails no rollback of this
preparation is done. This can result in transient handles being leaked
if the device is subsequently closed with no further commands performed.

Fix this by flushing the space in the event of command transmission
failure.

Comment 2 errata-xmlrpc 2025-05-13 08:29:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:6966 https://access.redhat.com/errata/RHSA-2025:6966


Note You need to log in before you can comment on or make changes to this bug.