libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6
エラータID: AXSA:2025-10656:01
リリース日:
2025/07/31 Thursday - 11:15
題名:
libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6
影響のあるチャネル:
MIRACLE LINUX 9 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- libtpms には、メモリ領域の範囲外読み取りの問題があるため、
ローカルの攻撃者により、サービス拒否攻撃および任意のコードの
実行を可能とする脆弱性が存在します。(CVE-2025-49133)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2025-49133
Libtpms is a library that targets the integration of TPM functionality into hypervisors, primarily into Qemu. Libtpms, which is derived from the TPM 2.0 reference implementation code published by the Trusted Computing Group, is prone to a potential out of bounds (OOB) read vulnerability. The vulnerability occurs in the ‘CryptHmacSign’ function with an inconsistent pairing of the signKey and signScheme parameters, where the signKey is ALG_KEYEDHASH key and inScheme is an ECC or RSA scheme. The reported vulnerability is in the ‘CryptHmacSign’ function, which is defined in the "Part 4: Supporting Routines – Code" document, section "7.151 - /tpm/src/crypt/CryptUtil.c ". This vulnerability can be triggered from user-mode applications by sending malicious commands to a TPM 2.0/vTPM (swtpm) whose firmware is based on an affected TCG reference implementation. The effect on libtpms is that it will cause an abort due to the detection of the out-of-bounds access, thus for example making a vTPM (swtpm) unavailable to a VM. This vulnerability is fixed in 0.7.12, 0.8.10, 0.9.7, and 0.10.1.
Libtpms is a library that targets the integration of TPM functionality into hypervisors, primarily into Qemu. Libtpms, which is derived from the TPM 2.0 reference implementation code published by the Trusted Computing Group, is prone to a potential out of bounds (OOB) read vulnerability. The vulnerability occurs in the ‘CryptHmacSign’ function with an inconsistent pairing of the signKey and signScheme parameters, where the signKey is ALG_KEYEDHASH key and inScheme is an ECC or RSA scheme. The reported vulnerability is in the ‘CryptHmacSign’ function, which is defined in the "Part 4: Supporting Routines – Code" document, section "7.151 - /tpm/src/crypt/CryptUtil.c ". This vulnerability can be triggered from user-mode applications by sending malicious commands to a TPM 2.0/vTPM (swtpm) whose firmware is based on an affected TCG reference implementation. The effect on libtpms is that it will cause an abort due to the detection of the out-of-bounds access, thus for example making a vTPM (swtpm) unavailable to a VM. This vulnerability is fixed in 0.7.12, 0.8.10, 0.9.7, and 0.10.1.
追加情報:
N/A
ダウンロード:
SRPMS
- libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.src.rpm
MD5: ecbb218f05e2a176deb5ac2c74e43599
SHA-256: 14121587980234c2b9af939d361735bada620a9aea11a11a84859f1a78a4efed
Size: 802.07 kB
Asianux Server 9 for x86_64
- libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.i686.rpm
MD5: e009747c89e38e56107322f94d0c483e
SHA-256: 6ea6a4bfcebad73c63495724913f251820363154a48a7473858d5aaf28991bb9
Size: 189.43 kB - libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.x86_64.rpm
MD5: de6847b2a18257a7df7e915f6105545f
SHA-256: 59db869d34ed2e0f6c8b64419dca00bc4d38422db7caec8d29418ddf153e995c
Size: 181.74 kB