Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-2453

Опубликовано: 15 мая 2023
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2023-2453: libtpms security update (MODERATE)

[0.9.1-3.20211126git1ff6fe1f43]

  • Backport 'tpm2: Check size of buffer before accessing it' (CVE-2023-1017 & CVE-2023-1018) Resolves: rhbz#2173960 Resolves: rhbz#2173967

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

libtpms

0.9.1-3.20211126git1ff6fe1f43.el9_2

Oracle Linux x86_64

libtpms

0.9.1-3.20211126git1ff6fe1f43.el9_2

Связанные CVE

Связанные уязвимости

suse-cvrf
около 2 лет назад

Security update for libtpms

CVSS3: 7.8
redos
около 2 лет назад

Множественные уязвимости ТРМ

CVSS3: 7.8
ubuntu
больше 2 лет назад

An out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end of TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can lead to denial of service (crashing the TPM chip/process or rendering it unusable) and/or arbitrary code execution in the TPM context.

CVSS3: 7.1
redhat
больше 2 лет назад

An out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end of TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can lead to denial of service (crashing the TPM chip/process or rendering it unusable) and/or arbitrary code execution in the TPM context.

CVSS3: 7.8
nvd
больше 2 лет назад

An out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end of TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can lead to denial of service (crashing the TPM chip/process or rendering it unusable) and/or arbitrary code execution in the TPM context.