Vulnerability CVE-2023-1017: Information
Description
An out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end of TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can lead to denial of service (crashing the TPM chip/process or rendering it unusable) and/or arbitrary code execution in the TPM context.
Severity: HIGH (7.8) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Fixed packages
Package name | Branch | Fixed in version | Version from repository | Errata ID | Task # | State |
---|---|---|---|---|---|---|
libtpms | sisyphus | 0.9.6-alt1 | 0.9.6-alt1 | ALT-PU-2023-1896-1 | 321955 | Fixed |
libtpms | sisyphus_e2k | 0.9.6-alt1 | 0.9.6-alt1 | ALT-PU-2023-3706-1 | - | Fixed |
libtpms | sisyphus_riscv64 | 0.9.6-alt1 | 0.9.6-alt1 | ALT-PU-2023-3718-1 | - | Fixed |
libtpms | p10 | 0.9.6-alt1 | 0.9.6-alt1 | ALT-PU-2023-1933-1 | 322023 | Fixed |
libtpms | p10_e2k | 0.9.6-alt1 | 0.9.6-alt1 | ALT-PU-2023-3803-1 | - | Fixed |
References to Advisories, Solutions, and Tools
Hyperlink | Resource |
---|---|
https://kb.cert.org/vuls/id/782720 |
|
https://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf |
|
https://trustedcomputinggroup.org/about/security/ |
|