First published: Thu Jan 19 2023(Updated: )
Last updated 24 July 2024
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tpm2-tss | <=3.0.3-2 | 3.2.1-3 4.0.1-7.2 4.1.3-1 |
CentOS Tpm2-tss | <=4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22745 has been classified with a moderate severity level due to potential memory corruption issues.
To fix CVE-2023-22745, upgrade to tpm2-tss versions 3.2.1-3, 4.0.1-7.2, or 4.1.3-1.
CVE-2023-22745 affects the tpm2-tss versions up to and including 4.0.0 for the Trusted Platform Module 2 Software Stack.
Exploitation of CVE-2023-22745 may lead to application crashes or unexpected behavior due to memory corruption.
CVE-2023-22745 does not specifically indicate remote exploitation capabilities, focusing instead on local memory handling issues.