CVE-2021-46922: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: KEYS: trusted: Fix TPM reservation for seal/unseal The original patch 8c657a0590de ("KEYS: trusted: Reserve TPM for seal and unseal operations") was correct on the mailing list: https://lore.kernel.org/linux-integrity/20210128235621.127925-4-jarkko@kernel.org/ But somehow got rebased so that the tpm_try_get_ops() in tpm2_seal_trusted() got lost. This causes an imbalanced put of the TPM ops and causes oopses on TIS based hardware. This fix puts back the lost tpm_try_get_ops()
AI Analysis
Technical Summary
CVE-2021-46922 is a vulnerability identified in the Linux kernel's Trusted Platform Module (TPM) integration, specifically within the KEYS subsystem responsible for trusted key management. The issue arises from a regression introduced during a patch rebase, where the function call tpm_try_get_ops() was inadvertently removed from the tpm2_seal_trusted() function. This omission leads to an imbalance in TPM operation references, causing improper handling of TPM operations. The consequence is kernel oops (crashes) on hardware that uses the TPM Interface Specification (TIS) for TPM communication. TPM is a hardware-based security module used for cryptographic operations such as sealing and unsealing keys, which are critical for system integrity and secure boot processes. The vulnerability affects specific Linux kernel versions identified by commit hashes, indicating it is present in certain development or stable branches prior to the fix. Although no known exploits are reported in the wild, the flaw can cause system instability or denial of service due to kernel crashes when TPM seal/unseal operations are invoked. The fix restores the missing tpm_try_get_ops() call, ensuring proper TPM operation reference counting and preventing the kernel oops on affected hardware.
Potential Impact
For European organizations relying on Linux systems with TPM hardware, this vulnerability could lead to unexpected kernel crashes during TPM seal/unseal operations. This can disrupt services that depend on hardware-based security features such as disk encryption, secure boot, or trusted key storage, potentially causing denial of service conditions. Organizations using TPM-enabled Linux servers, workstations, or embedded devices may experience system instability or downtime, impacting business continuity and security posture. Although the vulnerability does not directly expose sensitive data or allow privilege escalation, the resulting kernel oops can degrade system availability and reliability. In sectors like finance, healthcare, or critical infrastructure within Europe, where TPM is often used to enforce strong security policies, this instability could hinder compliance and operational security. However, since exploitation requires specific TPM hardware and invoking seal/unseal operations, the attack surface is somewhat limited. No evidence of active exploitation reduces immediate risk but patching remains important to maintain system stability and trust in TPM-based security mechanisms.
Mitigation Recommendations
European organizations should promptly apply the Linux kernel patch that restores the tpm_try_get_ops() call in the tpm2_seal_trusted() function. Specifically, updating to a Linux kernel version that includes the fix for CVE-2021-46922 is essential. Organizations should audit their Linux systems to identify those running affected kernel versions and verify the presence of TPM hardware using the TIS interface. For critical systems, testing the updated kernel in a staging environment before deployment is advisable to ensure compatibility and stability. Additionally, monitoring kernel logs for TPM-related oops or crashes can help detect if the vulnerability is being triggered. Organizations should also review their TPM usage policies and ensure that applications invoking TPM seal/unseal operations handle errors gracefully to avoid cascading failures. Maintaining up-to-date firmware for TPM modules and ensuring secure configuration of TPM features will further reduce risk. Finally, incorporating this vulnerability into vulnerability management and patching workflows will help prevent future regressions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2021-46922: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: KEYS: trusted: Fix TPM reservation for seal/unseal The original patch 8c657a0590de ("KEYS: trusted: Reserve TPM for seal and unseal operations") was correct on the mailing list: https://lore.kernel.org/linux-integrity/20210128235621.127925-4-jarkko@kernel.org/ But somehow got rebased so that the tpm_try_get_ops() in tpm2_seal_trusted() got lost. This causes an imbalanced put of the TPM ops and causes oopses on TIS based hardware. This fix puts back the lost tpm_try_get_ops()
AI-Powered Analysis
Technical Analysis
CVE-2021-46922 is a vulnerability identified in the Linux kernel's Trusted Platform Module (TPM) integration, specifically within the KEYS subsystem responsible for trusted key management. The issue arises from a regression introduced during a patch rebase, where the function call tpm_try_get_ops() was inadvertently removed from the tpm2_seal_trusted() function. This omission leads to an imbalance in TPM operation references, causing improper handling of TPM operations. The consequence is kernel oops (crashes) on hardware that uses the TPM Interface Specification (TIS) for TPM communication. TPM is a hardware-based security module used for cryptographic operations such as sealing and unsealing keys, which are critical for system integrity and secure boot processes. The vulnerability affects specific Linux kernel versions identified by commit hashes, indicating it is present in certain development or stable branches prior to the fix. Although no known exploits are reported in the wild, the flaw can cause system instability or denial of service due to kernel crashes when TPM seal/unseal operations are invoked. The fix restores the missing tpm_try_get_ops() call, ensuring proper TPM operation reference counting and preventing the kernel oops on affected hardware.
Potential Impact
For European organizations relying on Linux systems with TPM hardware, this vulnerability could lead to unexpected kernel crashes during TPM seal/unseal operations. This can disrupt services that depend on hardware-based security features such as disk encryption, secure boot, or trusted key storage, potentially causing denial of service conditions. Organizations using TPM-enabled Linux servers, workstations, or embedded devices may experience system instability or downtime, impacting business continuity and security posture. Although the vulnerability does not directly expose sensitive data or allow privilege escalation, the resulting kernel oops can degrade system availability and reliability. In sectors like finance, healthcare, or critical infrastructure within Europe, where TPM is often used to enforce strong security policies, this instability could hinder compliance and operational security. However, since exploitation requires specific TPM hardware and invoking seal/unseal operations, the attack surface is somewhat limited. No evidence of active exploitation reduces immediate risk but patching remains important to maintain system stability and trust in TPM-based security mechanisms.
Mitigation Recommendations
European organizations should promptly apply the Linux kernel patch that restores the tpm_try_get_ops() call in the tpm2_seal_trusted() function. Specifically, updating to a Linux kernel version that includes the fix for CVE-2021-46922 is essential. Organizations should audit their Linux systems to identify those running affected kernel versions and verify the presence of TPM hardware using the TIS interface. For critical systems, testing the updated kernel in a staging environment before deployment is advisable to ensure compatibility and stability. Additionally, monitoring kernel logs for TPM-related oops or crashes can help detect if the vulnerability is being triggered. Organizations should also review their TPM usage policies and ensure that applications invoking TPM seal/unseal operations handle errors gracefully to avoid cascading failures. Maintaining up-to-date firmware for TPM modules and ensuring secure configuration of TPM features will further reduce risk. Finally, incorporating this vulnerability into vulnerability management and patching workflows will help prevent future regressions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-25T13:45:52.719Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9835c4522896dcbea6be
Added to database: 5/21/2025, 9:09:09 AM
Last enriched: 6/26/2025, 9:52:59 AM
Last updated: 8/12/2025, 1:03:07 PM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.