Fedora Linux 8648 Published by

A libtpms security update has been released for Fedora 36.



SECURITY: Fedora 36 Update: libtpms-0.9.6-1.fc36


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-4afddd37a9
2023-03-16 18:18:56.871729
--------------------------------------------------------------------------------

Name : libtpms
Product : Fedora 36
Version : 0.9.6
Release : 1.fc36
URL :   http://github.com/stefanberger/libtpms
Summary : Library providing Trusted Platform Module (TPM) functionality
Description :
A library providing TPM functionality for VMs. Targeted for integration
into Qemu.

--------------------------------------------------------------------------------
Update Information:

Build of libtpms 0.9.6 with fixes for CVE-2023-1017 & CVE-2023-1018
--------------------------------------------------------------------------------
ChangeLog:

* Tue Feb 28 2023 Stefan Berger - 0.9.6-1
- Build of libtpms 0.9.6 with fixes for CVE-2023-1017 & CVE-2023-1018
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2174208 - CVE-2023-1018 libtpms: tpm2: TCG TPM2.0 implementations vulnerable to memory corruption [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2174208
[ 2 ] Bug #2174322 - CVE-2023-1017 libtpms: tpm: TCG TPM2.0 implementations vulnerable to memory corruption [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2174322
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-4afddd37a9' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________