An update for tpm2-tss is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2023-1079 Final 1.0 1.0 2023-02-10 Initial 2023-02-10 2023-02-10 openEuler SA Tool V1.0 2023-02-10 tpm2-tss security update An update for tpm2-tss is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1. tpm2-tss is a software stack supporting Trusted Platform Module(TPM) 2.0 system APIs which provides TPM2.0 specified APIs for applications to access TPM module through kernel TPM drivers. Security Fix(es): tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege.(CVE-2023-22745) An update for tpm2-tss is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1. openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Medium tpm2-tss https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1079 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-22745 https://nvd.nist.gov/vuln/detail/CVE-2023-22745 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 tpm2-tss-3.0.3-2.oe1.aarch64.rpm tpm2-tss-debugsource-3.0.3-2.oe1.aarch64.rpm tpm2-tss-debuginfo-3.0.3-2.oe1.aarch64.rpm tpm2-tss-devel-3.0.3-2.oe1.aarch64.rpm tpm2-tss-3.0.3-2.oe1.aarch64.rpm tpm2-tss-devel-3.0.3-2.oe1.aarch64.rpm tpm2-tss-debuginfo-3.0.3-2.oe1.aarch64.rpm tpm2-tss-debugsource-3.0.3-2.oe1.aarch64.rpm tpm2-tss-debuginfo-3.1.0-3.oe2203.aarch64.rpm tpm2-tss-debugsource-3.1.0-3.oe2203.aarch64.rpm tpm2-tss-3.1.0-3.oe2203.aarch64.rpm tpm2-tss-devel-3.1.0-3.oe2203.aarch64.rpm tpm2-tss-devel-3.1.0-3.oe2203sp1.aarch64.rpm tpm2-tss-debuginfo-3.1.0-3.oe2203sp1.aarch64.rpm tpm2-tss-debugsource-3.1.0-3.oe2203sp1.aarch64.rpm tpm2-tss-3.1.0-3.oe2203sp1.aarch64.rpm tpm2-tss-help-3.0.3-2.oe1.noarch.rpm tpm2-tss-help-3.0.3-2.oe1.noarch.rpm tpm2-tss-help-3.1.0-3.oe2203.noarch.rpm tpm2-tss-help-3.1.0-3.oe2203sp1.noarch.rpm tpm2-tss-3.0.3-2.oe1.src.rpm tpm2-tss-3.0.3-2.oe1.src.rpm tpm2-tss-3.1.0-3.oe2203.src.rpm tpm2-tss-3.1.0-3.oe2203sp1.src.rpm tpm2-tss-devel-3.0.3-2.oe1.x86_64.rpm tpm2-tss-debugsource-3.0.3-2.oe1.x86_64.rpm tpm2-tss-debuginfo-3.0.3-2.oe1.x86_64.rpm tpm2-tss-3.0.3-2.oe1.x86_64.rpm tpm2-tss-3.0.3-2.oe1.x86_64.rpm tpm2-tss-devel-3.0.3-2.oe1.x86_64.rpm tpm2-tss-debuginfo-3.0.3-2.oe1.x86_64.rpm tpm2-tss-debugsource-3.0.3-2.oe1.x86_64.rpm tpm2-tss-debuginfo-3.1.0-3.oe2203.x86_64.rpm tpm2-tss-devel-3.1.0-3.oe2203.x86_64.rpm tpm2-tss-debugsource-3.1.0-3.oe2203.x86_64.rpm tpm2-tss-3.1.0-3.oe2203.x86_64.rpm tpm2-tss-debuginfo-3.1.0-3.oe2203sp1.x86_64.rpm tpm2-tss-debugsource-3.1.0-3.oe2203sp1.x86_64.rpm tpm2-tss-devel-3.1.0-3.oe2203sp1.x86_64.rpm tpm2-tss-3.1.0-3.oe2203sp1.x86_64.rpm tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege. 2023-02-10 CVE-2023-22745 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 Medium 6.4 AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H tpm2-tss security update 2023-02-10 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1079