CVE-2022-49287
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
26/02/2025
Last modified:
25/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tpm: fix reference counting for struct tpm_chip<br />
<br />
The following sequence of operations results in a refcount warning:<br />
<br />
1. Open device /dev/tpmrm.<br />
2. Remove module tpm_tis_spi.<br />
3. Write a TPM command to the file descriptor opened at step 1.<br />
<br />
------------[ cut here ]------------<br />
WARNING: CPU: 3 PID: 1161 at lib/refcount.c:25 kobject_get+0xa0/0xa4<br />
refcount_t: addition on 0; use-after-free.<br />
Modules linked in: tpm_tis_spi tpm_tis_core tpm mdio_bcm_unimac brcmfmac<br />
sha256_generic libsha256 sha256_arm hci_uart btbcm bluetooth cfg80211 vc4<br />
brcmutil ecdh_generic ecc snd_soc_core crc32_arm_ce libaes<br />
raspberrypi_hwmon ac97_bus snd_pcm_dmaengine bcm2711_thermal snd_pcm<br />
snd_timer genet snd phy_generic soundcore [last unloaded: spi_bcm2835]<br />
CPU: 3 PID: 1161 Comm: hold_open Not tainted 5.10.0ls-main-dirty #2<br />
Hardware name: BCM2711<br />
[] (unwind_backtrace) from [] (show_stack+0x10/0x14)<br />
[] (show_stack) from [] (dump_stack+0xc4/0xd8)<br />
[] (dump_stack) from [] (__warn+0x104/0x108)<br />
[] (__warn) from [] (warn_slowpath_fmt+0x74/0xb8)<br />
[] (warn_slowpath_fmt) from [] (kobject_get+0xa0/0xa4)<br />
[] (kobject_get) from [] (tpm_try_get_ops+0x14/0x54 [tpm])<br />
[] (tpm_try_get_ops [tpm]) from [] (tpm_common_write+0x38/0x60 [tpm])<br />
[] (tpm_common_write [tpm]) from [] (vfs_write+0xc4/0x3c0)<br />
[] (vfs_write) from [] (ksys_write+0x58/0xcc)<br />
[] (ksys_write) from [] (ret_fast_syscall+0x0/0x4c)<br />
Exception stack(0xc226bfa8 to 0xc226bff0)<br />
bfa0: 00000000 000105b4 00000003 beafe664 00000014 00000000<br />
bfc0: 00000000 000105b4 000103f8 00000004 00000000 00000000 b6f9c000 beafe684<br />
bfe0: 0000006c beafe648 0001056c b6eb6944<br />
---[ end trace d4b8409def9b8b1f ]---<br />
<br />
The reason for this warning is the attempt to get the chip->dev reference<br />
in tpm_common_write() although the reference counter is already zero.<br />
<br />
Since commit 8979b02aaf1d ("tpm: Fix reference count to main device") the<br />
extra reference used to prevent a premature zero counter is never taken,<br />
because the required TPM_CHIP_FLAG_TPM2 flag is never set.<br />
<br />
Fix this by moving the TPM 2 character device handling from<br />
tpm_chip_alloc() to tpm_add_char_device() which is called at a later point<br />
in time when the flag has been set in case of TPM2.<br />
<br />
Commit fdc915f7f719 ("tpm: expose spaces via a device link /dev/tpmrm")<br />
already introduced function tpm_devs_release() to release the extra<br />
reference but did not implement the required put on chip->devs that results<br />
in the call of this function.<br />
<br />
Fix this by putting chip->devs in tpm_chip_unregister().<br />
<br />
Finally move the new implementation for the TPM 2 handling into a new<br />
function to avoid multiple checks for the TPM_CHIP_FLAG_TPM2 flag in the<br />
good case and error cases.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.12 (including) | 4.14.276 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.238 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.189 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.110 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.33 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.16.19 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.17 (including) | 5.17.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/290e05f346d1829e849662c97e42d5ad984f5258
- https://git.kernel.org/stable/c/2f928c0d5c02dbab49e8c19d98725c822f6fc409
- https://git.kernel.org/stable/c/473a66f99cb8173c14138c5a5c69bfad04e8f9ac
- https://git.kernel.org/stable/c/662893b4f6bd466ff9e1cd454c44c26d32d554fe
- https://git.kernel.org/stable/c/6e7baf84149fb43950631415de231b3a41915aa3
- https://git.kernel.org/stable/c/7e0438f83dc769465ee663bb5dcf8cc154940712
- https://git.kernel.org/stable/c/a27ed2f3695baf15f9b34d2d7a1f9fc105539a81
- https://git.kernel.org/stable/c/cb64bd038beacb4331fe464a36c8b5481e8f51e2



