Mageia 2021-0590: libtpms/swtpm security update

Advisories

MGASA-2021-0590 - Updated libtpms/swtpm packages fix security vulnerability

Publication date: 30 Dec 2021
URL: https://advisories.mageia.org/MGASA-2021-0590.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2021-3446,
     CVE-2021-3505,
     CVE-2021-3623,
     CVE-2021-3746

CryptSym: fix AES output IV (CVE-2021-3505).
Fixed a context save and suspend/resume problem when public keys are
loaded.
Reset too large size indicators in TPM2B to avoid access beyond buffer
(CVE-2021-3623)
Restore original value in buffer if unmarshalled one was illegal
Fixed out-of-bounds access via specially crafted TPM 2 command packets
(CVE-2021-3746)
Marshal event sequence objects' hash state

References:
- https://bugs.mageia.org/show_bug.cgi?id=28882
- https://lists.fedoraproject.org/archives/list/[email protected]/message/NUCZX4S53TUNTSGTCRDNOQZV2V2RI4RJ/
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/46YMIRHQHNKPCVNRVW4W27MFQQU7ZHHV/
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/Z7KZSYMTE7Z4BBEZUWO2DIMQDWMGEP46/
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/DZI42OR3JUEGWRKEVCOHL2FPTJVYCYBT/
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/7UCZ7AV2UKWYYCNZ2NLLXW7QYCX7K337/
- https://lists.opensuse.org/archives/list/[email protected]/thread/75RD2O2OFCMWPCMY5QMSZRNV5PG5BTS6/
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/YVJSXDXD44WDR4VA2XL33IZDJTBGRXP7/
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/7E3B6T5RBDKAWETDTW3WPORY3NK5IR46/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3446
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3505
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3623
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3746

SRPMS:
- 8/core/libtpms-0.9.1-1.mga8
- 8/core/swtpm-0.7.0-5.mga8

Mageia 2021-0590: libtpms/swtpm security update

CryptSym: fix AES output IV (CVE-2021-3505)

Summary

CryptSym: fix AES output IV (CVE-2021-3505). Fixed a context save and suspend/resume problem when public keys are loaded. Reset too large size indicators in TPM2B to avoid access beyond buffer (CVE-2021-3623) Restore original value in buffer if unmarshalled one was illegal Fixed out-of-bounds access via specially crafted TPM 2 command packets (CVE-2021-3746) Marshal event sequence objects' hash state

References

- https://bugs.mageia.org/show_bug.cgi?id=28882

- https://lists.fedoraproject.org/archives/list/[email protected]/message/NUCZX4S53TUNTSGTCRDNOQZV2V2RI4RJ/

- https://lists.fedoraproject.org/archives/list/[email protected]/thread/46YMIRHQHNKPCVNRVW4W27MFQQU7ZHHV/

- https://lists.fedoraproject.org/archives/list/[email protected]/thread/Z7KZSYMTE7Z4BBEZUWO2DIMQDWMGEP46/

- https://lists.fedoraproject.org/archives/list/[email protected]/thread/DZI42OR3JUEGWRKEVCOHL2FPTJVYCYBT/

- https://lists.fedoraproject.org/archives/list/[email protected]/thread/7UCZ7AV2UKWYYCNZ2NLLXW7QYCX7K337/

- https://lists.opensuse.org/archives/list/[email protected]/thread/75RD2O2OFCMWPCMY5QMSZRNV5PG5BTS6/

- https://lists.fedoraproject.org/archives/list/[email protected]/thread/YVJSXDXD44WDR4VA2XL33IZDJTBGRXP7/

- https://lists.fedoraproject.org/archives/list/[email protected]/thread/7E3B6T5RBDKAWETDTW3WPORY3NK5IR46/

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3446

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3505

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3623

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3746

Resolution

MGASA-2021-0590 - Updated libtpms/swtpm packages fix security vulnerability

SRPMS

- 8/core/libtpms-0.9.1-1.mga8

- 8/core/swtpm-0.7.0-5.mga8

Severity
Publication date: 30 Dec 2021
URL: https://advisories.mageia.org/MGASA-2021-0590.html
Type: security
CVE: CVE-2021-3446, CVE-2021-3505, CVE-2021-3623, CVE-2021-3746

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.