{"id":"CVE-2021-46922","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nKEYS: trusted: Fix TPM reservation for seal/unseal\n\nThe original patch 8c657a0590de (\"KEYS: trusted: Reserve TPM for seal\nand unseal operations\") was correct on the mailing list:\n\nhttps://lore.kernel.org/linux-integrity/20210128235621.127925-4-jarkko@kernel.org/\n\nBut somehow got rebased so that the tpm_try_get_ops() in\ntpm2_seal_trusted() got lost.  This causes an imbalanced put of the\nTPM ops and causes oopses on TIS based hardware.\n\nThis fix puts back the lost tpm_try_get_ops()","modified":"2026-03-15T22:42:40.640840Z","published":"2024-02-27T10:15:07.053Z","related":["SUSE-SU-2024:1465-1","SUSE-SU-2024:1489-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/bf84ef2dd2ccdcd8f2658476d34b51455f970ce4"},{"type":"FIX","url":"https://git.kernel.org/stable/c/39c8d760d44cb3fa0d67e8cd505df81cf4d80999"},{"type":"FIX","url":"https://git.kernel.org/stable/c/9d5171eab462a63e2fbebfccf6026e92be018f20"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-46922.json","unresolved_ranges":[{"events":[{"introduced":"5.10.20"},{"fixed":"5.10.33"}]},{"events":[{"introduced":"5.11.3"},{"fixed":"5.11.17"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}