CVE-2022-49286
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
26/02/2025
Last modified:
22/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tpm: use try_get_ops() in tpm-space.c<br />
<br />
As part of the series conversion to remove nested TPM operations:<br />
<br />
https://lore.kernel.org/all/20190205224723.19671-1-jarkko.sakkinen@linux.intel.com/<br />
<br />
exposure of the chip->tpm_mutex was removed from much of the upper<br />
level code. In this conversion, tpm2_del_space() was missed. This<br />
didn&#39;t matter much because it&#39;s usually called closely after a<br />
converted operation, so there&#39;s only a very tiny race window where the<br />
chip can be removed before the space flushing is done which causes a<br />
NULL deref on the mutex. However, there are reports of this window<br />
being hit in practice, so fix this by converting tpm2_del_space() to<br />
use tpm_try_get_ops(), which performs all the teardown checks before<br />
acquring the mutex.
Impact
Base Score 3.x
4.70
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.12 (including) | 5.4.188 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.109 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.32 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.16.18 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.17:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/476ddd23f818fb94cf86fb5617f3bb9a7c92113d
- https://git.kernel.org/stable/c/5b1d2561a03e534064b51c50c774657833d3d2cf
- https://git.kernel.org/stable/c/95193d12f10a8a088843b25e0f5fe1d83ec6b079
- https://git.kernel.org/stable/c/ba84f9a48366dcc3cdef978599433efe101dd5bd
- https://git.kernel.org/stable/c/eda1662cce964c8a65bb86321f8d9cfa6e9ceaab
- https://git.kernel.org/stable/c/fb5abce6b2bb5cb3d628aaa63fa821da8c4600f9



