VYPR
Medium severity5.5NVD Advisory· Published Oct 21, 2024· Updated May 12, 2026

CVE-2024-49851

CVE-2024-49851

Description

In the Linux kernel, the following vulnerability has been resolved:

tpm: Clean up TPM space after command failure

tpm_dev_transmit prepares the TPM space before attempting command transmission. However if the command fails no rollback of this preparation is done. This can result in transient handles being leaked if the device is subsequently closed with no further commands performed.

Fix this by flushing the space in the event of command transmission failure.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A vulnerability in the Linux kernel's TPM subsystem leaks transient handles when command transmission fails, requiring local access for exploitation.

Vulnerability

Details

CVE-2024-49851 describes a flaw in the Linux kernel's TPM (Trusted Platform Module) subsystem. The function tpm_dev_transmit prepares the TPM space before attempting to send a command. However, if the command transmission fails, no rollback of this preparation is performed, leading to transient handles being leaked when the device is subsequently closed without further commands [1][2].

Exploitation

Exploitation requires local access to the system with the ability to interact with the TPM device. The attack surface is local, as the vulnerability is within the kernel's TPM driver code. No special privileges beyond being able to open the TPM device are necessary, making it accessible to unprivileged local users. Successful exploitation involves triggering a command failure that leaves the TPM space in an inconsistent state [1][2].

Impact

The primary impact is a denial of service (DoS) condition due to the exhaustion of TPM transient handles, which could prevent legitimate TPM operations. The CVSS v3.1 base score is 5.5 (Medium) with a vector of AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating no confidentiality or integrity impact, but high availability impact [1][2].

Mitigation

The vulnerability is addressed in the Linux kernel by flushing the TPM space upon command transmission failure. The fix is included in stable kernel updates. Users should apply the latest kernel patches from their distribution. Siemens has confirmed that affected products, such as the SIMATIC S7-1500 TM MFP GNU/Linux subsystem, require updates [1]. References to the exact commits are available, though the referenced kernel.org pages are behind an Anubis proof-of-work challenge and cannot be directly accessed [3][4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

114

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

12

News mentions

0

No linked articles in our index yet.