Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-46922
HistoryFeb 27, 2024 - 12:00 a.m.

CVE-2021-46922

2024-02-2700:00:00
ubuntu.com
ubuntu.com
9
linux kernel
vulnerability
cve-2021-46922
keys
trusted
tpm
reservation
fix
rebased
oopses

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.7

Confidence

Low

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved: KEYS:
trusted: Fix TPM reservation for seal/unseal The original patch
8c657a0590de (“KEYS: trusted: Reserve TPM for seal and unseal operations”)
was correct on the mailing list:
https://lore.kernel.org/linux-integrity/[email protected]/
But somehow got rebased so that the tpm_try_get_ops() in
tpm2_seal_trusted() got lost. This causes an imbalanced put of the TPM ops
and causes oopses on TIS based hardware. This fix puts back the lost
tpm_try_get_ops()

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.7

Confidence

Low

EPSS

0

Percentile

5.1%