• CVE-2022-23645

发布时间: 2022年3月19日

修改时间: 2024年10月31日

概要

swtpm is a libtpms-based TPM emulator with socket, character device, and Linux CUSE interface. Versions prior to 0.5.3, 0.6.2, and 0.7.1 are vulnerable to out-of-bounds read. A specially crafted header of swtpm s state, where the blobheader s hdrsize indicator has an invalid value, may cause an out-of-bounds access when the byte array representing the state of the TPM is accessed. This will likely crash swtpm or prevent it from starting since the state cannot be understood. Users should upgrade to swtpm v0.5.3, v0.6.2, or v0.7.1 to receive a patch. There are currently no known workarounds.

CVSS v3 指标

NVD openEuler
Confidentiality None None
Attack Vector Local Local
CVSS评分 5.5 5.5
Attack Complexity Low Low
Privileges Required Low Low
Scope Unchanged Unchanged
Integrity None None
User Interaction None None
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2022-1333 swtpm security update 2022年3月19日
KylinSec-SA-2022-2640 swtpm security update 2022年11月11日

影响产品

产品 状态
KY3.4-4A swtpm Fixed
KY3.4-5A swtpm Fixed
KY3.5.1 swtpm Fixed