First published: Tue Nov 12 2024(Updated: )
Low: tpm2-tools security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tpm2-tools | <5.2-4.el9 | 5.2-4.el9 |
redhat/tpm2-tools | <5.2-4.el9 | 5.2-4.el9 |
redhat/tpm2-tools-debuginfo | <5.2-4.el9 | 5.2-4.el9 |
redhat/tpm2-tools-debugsource | <5.2-4.el9 | 5.2-4.el9 |
redhat/tpm2-tools-debuginfo | <5.2-4.el9 | 5.2-4.el9 |
redhat/tpm2-tools-debugsource | <5.2-4.el9 | 5.2-4.el9 |
redhat/tpm2-tools | <5.2-4.el9 | 5.2-4.el9 |
redhat/tpm2-tools-debuginfo | <5.2-4.el9 | 5.2-4.el9 |
redhat/tpm2-tools-debugsource | <5.2-4.el9 | 5.2-4.el9 |
redhat/tpm2-tools | <5.2-4.el9.aa | 5.2-4.el9.aa |
redhat/tpm2-tools-debuginfo | <5.2-4.el9.aa | 5.2-4.el9.aa |
redhat/tpm2-tools-debugsource | <5.2-4.el9.aa | 5.2-4.el9.aa |
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux for ARM 64 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2024:9424 addresses a security vulnerability affecting tpm2-tools that allows arbitrary quote data to go undetected by tpm2_checkquote.
To mitigate the vulnerability in RHSA-2024:9424, users should update to the patched version 5.2-4.el9 of tpm2-tools.
RHSA-2024:9424 impacts multiple architectures of Red Hat Enterprise Linux including x86_64, Power, IBM z Systems, and ARM 64.
Yes, for RHSA-2024:9424, you need to upgrade tpm2-tools to version 5.2-4.el9.
The risk posed by RHSA-2024:9424 involves potential unauthorized detection of arbitrary quote data, which may compromise the integrity of a Trusted Platform Module.