An update for tpm2-tss is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2023-1079
Final
1.0
1.0
2023-02-10
Initial
2023-02-10
2023-02-10
openEuler SA Tool V1.0
2023-02-10
tpm2-tss security update
An update for tpm2-tss is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1.
tpm2-tss is a software stack supporting Trusted Platform Module(TPM) 2.0 system APIs which provides TPM2.0 specified APIs for applications to access TPM module through kernel TPM drivers.
Security Fix(es):
tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege.(CVE-2023-22745)
An update for tpm2-tss is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Medium
tpm2-tss
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1079
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-22745
https://nvd.nist.gov/vuln/detail/CVE-2023-22745
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
tpm2-tss-3.0.3-2.oe1.aarch64.rpm
tpm2-tss-debugsource-3.0.3-2.oe1.aarch64.rpm
tpm2-tss-debuginfo-3.0.3-2.oe1.aarch64.rpm
tpm2-tss-devel-3.0.3-2.oe1.aarch64.rpm
tpm2-tss-3.0.3-2.oe1.aarch64.rpm
tpm2-tss-devel-3.0.3-2.oe1.aarch64.rpm
tpm2-tss-debuginfo-3.0.3-2.oe1.aarch64.rpm
tpm2-tss-debugsource-3.0.3-2.oe1.aarch64.rpm
tpm2-tss-debuginfo-3.1.0-3.oe2203.aarch64.rpm
tpm2-tss-debugsource-3.1.0-3.oe2203.aarch64.rpm
tpm2-tss-3.1.0-3.oe2203.aarch64.rpm
tpm2-tss-devel-3.1.0-3.oe2203.aarch64.rpm
tpm2-tss-devel-3.1.0-3.oe2203sp1.aarch64.rpm
tpm2-tss-debuginfo-3.1.0-3.oe2203sp1.aarch64.rpm
tpm2-tss-debugsource-3.1.0-3.oe2203sp1.aarch64.rpm
tpm2-tss-3.1.0-3.oe2203sp1.aarch64.rpm
tpm2-tss-help-3.0.3-2.oe1.noarch.rpm
tpm2-tss-help-3.0.3-2.oe1.noarch.rpm
tpm2-tss-help-3.1.0-3.oe2203.noarch.rpm
tpm2-tss-help-3.1.0-3.oe2203sp1.noarch.rpm
tpm2-tss-3.0.3-2.oe1.src.rpm
tpm2-tss-3.0.3-2.oe1.src.rpm
tpm2-tss-3.1.0-3.oe2203.src.rpm
tpm2-tss-3.1.0-3.oe2203sp1.src.rpm
tpm2-tss-devel-3.0.3-2.oe1.x86_64.rpm
tpm2-tss-debugsource-3.0.3-2.oe1.x86_64.rpm
tpm2-tss-debuginfo-3.0.3-2.oe1.x86_64.rpm
tpm2-tss-3.0.3-2.oe1.x86_64.rpm
tpm2-tss-3.0.3-2.oe1.x86_64.rpm
tpm2-tss-devel-3.0.3-2.oe1.x86_64.rpm
tpm2-tss-debuginfo-3.0.3-2.oe1.x86_64.rpm
tpm2-tss-debugsource-3.0.3-2.oe1.x86_64.rpm
tpm2-tss-debuginfo-3.1.0-3.oe2203.x86_64.rpm
tpm2-tss-devel-3.1.0-3.oe2203.x86_64.rpm
tpm2-tss-debugsource-3.1.0-3.oe2203.x86_64.rpm
tpm2-tss-3.1.0-3.oe2203.x86_64.rpm
tpm2-tss-debuginfo-3.1.0-3.oe2203sp1.x86_64.rpm
tpm2-tss-debugsource-3.1.0-3.oe2203sp1.x86_64.rpm
tpm2-tss-devel-3.1.0-3.oe2203sp1.x86_64.rpm
tpm2-tss-3.1.0-3.oe2203sp1.x86_64.rpm
tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege.
2023-02-10
CVE-2023-22745
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
Medium
6.4
AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
tpm2-tss security update
2023-02-10
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1079