Lucene search

K
mageiaGentoo FoundationMGASA-2024-0171
HistoryMay 09, 2024 - 5:40 a.m.

Updated tpm2-tss packages fix security vulnerabilities

2024-05-0905:40:29
Gentoo Foundation
advisories.mageia.org
16
tpm2-tss
security vulnerabilities
arbitrary quote data
unix

4.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

7.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.2%

A flaw was found in the tpm2-tss package, where there was no check that the magic number in the attest is equal to the TPM2_GENERATED_VALUE. This flaw allows an attacker to generate arbitrary quote data, which may not be detected by Fapi_VerifyQuote.

OSVersionArchitecturePackageVersionFilename
Mageia9noarchtpm2-tss< 4.0.2-1tpm2-tss-4.0.2-1.mga9

4.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

7.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.2%