First published: Wed Sep 14 2022(Updated: )
A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=4.12<4.14.276 | |
Linux Kernel | >=4.15<4.19.238 | |
Linux Kernel | >=4.20<5.4.189 | |
Linux Kernel | >=5.5<5.10.110 | |
Linux Kernel | >=5.11<5.15.33 | |
Linux Kernel | >=5.16<5.16.19 | |
Linux Kernel | >=5.17<5.17.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2977 is considered a high-severity vulnerability due to the potential for local privilege escalation.
To mitigate CVE-2022-2977, upgrade your Linux kernel to a version that is not affected by the vulnerability.
CVE-2022-2977 affects Linux kernel versions between 4.12 and 5.17.1, specifically the versions 4.14.276 to 4.19.238, 4.20 to 5.4.189, 5.5 to 5.10.110, 5.11 to 5.15.33, and 5.16 to 5.16.19.
CVE-2022-2977 can be exploited by a local attacker to create a use-after-free condition, potentially leading to privilege escalation.
No, the configuration of virtualized TPM devices is not a default setting in Linux systems.