A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7KZSYMTE7Z4BBEZUWO2DIMQDWMGEP46/ | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1976806 | issue tracking third party advisory patch |
https://github.com/stefanberger/libtpms/pull/223 | issue tracking third party advisory |
https://github.com/stefanberger/libtpms/commit/2f30d62 | third party advisory patch |
https://github.com/stefanberger/libtpms/commit/7981d9a | third party advisory patch |
https://github.com/stefanberger/libtpms/commit/2e6173c | third party advisory patch |