Описание
Security update for swtpm
This update for swtpm fixes the following issues:
- Update to version 0.5.3
- CVE-2022-23645: Check header size indicator against expected size (bsc#1196240).
Список пакетов
Container suse/sles/15.4/virt-launcher:0.49.0
swtpm-0.5.3-150300.3.3.1
SUSE Linux Enterprise Micro 5.1
swtpm-0.5.3-150300.3.3.1
SUSE Linux Enterprise Module for Server Applications 15 SP3
swtpm-0.5.3-150300.3.3.1
swtpm-devel-0.5.3-150300.3.3.1
openSUSE Leap 15.3
swtpm-0.5.3-150300.3.3.1
swtpm-devel-0.5.3-150300.3.3.1
Ссылки
- Link for SUSE-SU-2022:1297-1
- E-Mail link for SUSE-SU-2022:1297-1
- SUSE Security Ratings
- SUSE Bug 1196240
- SUSE CVE CVE-2022-23645 page
Описание
swtpm is a libtpms-based TPM emulator with socket, character device, and Linux CUSE interface. Versions prior to 0.5.3, 0.6.2, and 0.7.1 are vulnerable to out-of-bounds read. A specially crafted header of swtpm's state, where the blobheader's hdrsize indicator has an invalid value, may cause an out-of-bounds access when the byte array representing the state of the TPM is accessed. This will likely crash swtpm or prevent it from starting since the state cannot be understood. Users should upgrade to swtpm v0.5.3, v0.6.2, or v0.7.1 to receive a patch. There are currently no known workarounds.
Затронутые продукты
Container suse/sles/15.4/virt-launcher:0.49.0:swtpm-0.5.3-150300.3.3.1
SUSE Linux Enterprise Micro 5.1:swtpm-0.5.3-150300.3.3.1
SUSE Linux Enterprise Module for Server Applications 15 SP3:swtpm-0.5.3-150300.3.3.1
SUSE Linux Enterprise Module for Server Applications 15 SP3:swtpm-devel-0.5.3-150300.3.3.1
Ссылки
- CVE-2022-23645
- SUSE Bug 1196240