First published: Fri Nov 27 2020(Updated: )
Missing initialization of a variable in the TPM2 source may allow a privileged user to potentially enable an escalation of privilege via local access. This affects tpm2-tss before 3.0.1 and before 2.4.3.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tpm2-tss | <2.4.3 | 2.4.3 |
CentOS Tpm2-tss | <2.4.3 | |
CentOS Tpm2-tss | >=3.0.0<3.0.1 | |
Red Hat Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24455 has a high severity rating due to the potential for privilege escalation by a local attacker.
To fix CVE-2020-24455, upgrade the tpm2-tss package to version 2.4.3 or later.
CVE-2020-24455 affects tpm2-tss versions prior to 2.4.3 and from 3.0.0 up to but not including 3.0.1.
CVE-2020-24455 can potentially be exploited by privileged users with local access to the system.
The impact of CVE-2020-24455 on system security includes potential escalation of privileges, which could allow attackers to gain unauthorized access to sensitive areas.