U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-49851 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: tpm: Clean up TPM space after command failure tpm_dev_transmit prepares the TPM space before attempting command transmission. However if the command fails no rollback of this preparation is done. This can result in transient handles being leaked if the device is subsequently closed with no further commands performed. Fix this by flushing the space in the event of command transmission failure.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/2c9b228938e9266a1065a3f4fe5c99b7235dc439 Patch 
https://git.kernel.org/stable/c/3f9f72d843c92fb6f4ff7460d774413cde7f254c Patch 
https://git.kernel.org/stable/c/82478cb8a23bd4f97935bbe60d64528c6d9918b4 Patch 
https://git.kernel.org/stable/c/adf4ce162561222338cf2c9a2caa294527f7f721 Patch 
https://git.kernel.org/stable/c/c84ceb546f30432fccea4891163f7050f5bee5dd Patch 
https://git.kernel.org/stable/c/e3aaebcbb7c6b403416f442d1de70d437ce313a7 Patch 
https://git.kernel.org/stable/c/ebc4e1f4492d114f9693950621b3ea42b2f82bec Patch 

Weakness Enumeration

CWE-ID CWE Name Source
CWE-459 Incomplete Cleanup cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-49851
NVD Published Date:
10/21/2024
NVD Last Modified:
10/23/2024
Source:
kernel.org