Skip to main content

CVE-2021-46922: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-46922cvecve-2021-46922
Published: Tue Feb 27 2024 (02/27/2024, 09:36:27 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: KEYS: trusted: Fix TPM reservation for seal/unseal The original patch 8c657a0590de ("KEYS: trusted: Reserve TPM for seal and unseal operations") was correct on the mailing list: https://lore.kernel.org/linux-integrity/20210128235621.127925-4-jarkko@kernel.org/ But somehow got rebased so that the tpm_try_get_ops() in tpm2_seal_trusted() got lost. This causes an imbalanced put of the TPM ops and causes oopses on TIS based hardware. This fix puts back the lost tpm_try_get_ops()

AI-Powered Analysis

AILast updated: 06/26/2025, 09:52:59 UTC

Technical Analysis

CVE-2021-46922 is a vulnerability identified in the Linux kernel's Trusted Platform Module (TPM) integration, specifically within the KEYS subsystem responsible for trusted key management. The issue arises from a regression introduced during a patch rebase, where the function call tpm_try_get_ops() was inadvertently removed from the tpm2_seal_trusted() function. This omission leads to an imbalance in TPM operation references, causing improper handling of TPM operations. The consequence is kernel oops (crashes) on hardware that uses the TPM Interface Specification (TIS) for TPM communication. TPM is a hardware-based security module used for cryptographic operations such as sealing and unsealing keys, which are critical for system integrity and secure boot processes. The vulnerability affects specific Linux kernel versions identified by commit hashes, indicating it is present in certain development or stable branches prior to the fix. Although no known exploits are reported in the wild, the flaw can cause system instability or denial of service due to kernel crashes when TPM seal/unseal operations are invoked. The fix restores the missing tpm_try_get_ops() call, ensuring proper TPM operation reference counting and preventing the kernel oops on affected hardware.

Potential Impact

For European organizations relying on Linux systems with TPM hardware, this vulnerability could lead to unexpected kernel crashes during TPM seal/unseal operations. This can disrupt services that depend on hardware-based security features such as disk encryption, secure boot, or trusted key storage, potentially causing denial of service conditions. Organizations using TPM-enabled Linux servers, workstations, or embedded devices may experience system instability or downtime, impacting business continuity and security posture. Although the vulnerability does not directly expose sensitive data or allow privilege escalation, the resulting kernel oops can degrade system availability and reliability. In sectors like finance, healthcare, or critical infrastructure within Europe, where TPM is often used to enforce strong security policies, this instability could hinder compliance and operational security. However, since exploitation requires specific TPM hardware and invoking seal/unseal operations, the attack surface is somewhat limited. No evidence of active exploitation reduces immediate risk but patching remains important to maintain system stability and trust in TPM-based security mechanisms.

Mitigation Recommendations

European organizations should promptly apply the Linux kernel patch that restores the tpm_try_get_ops() call in the tpm2_seal_trusted() function. Specifically, updating to a Linux kernel version that includes the fix for CVE-2021-46922 is essential. Organizations should audit their Linux systems to identify those running affected kernel versions and verify the presence of TPM hardware using the TIS interface. For critical systems, testing the updated kernel in a staging environment before deployment is advisable to ensure compatibility and stability. Additionally, monitoring kernel logs for TPM-related oops or crashes can help detect if the vulnerability is being triggered. Organizations should also review their TPM usage policies and ensure that applications invoking TPM seal/unseal operations handle errors gracefully to avoid cascading failures. Maintaining up-to-date firmware for TPM modules and ensuring secure configuration of TPM features will further reduce risk. Finally, incorporating this vulnerability into vulnerability management and patching workflows will help prevent future regressions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-25T13:45:52.719Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9835c4522896dcbea6be

Added to database: 5/21/2025, 9:09:09 AM

Last enriched: 6/26/2025, 9:52:59 AM

Last updated: 8/12/2025, 1:03:07 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats