<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">Security update for tpm2-0-tss</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:0613-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-03-03T11:07:53Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-03-03T11:07:53Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-03-03T11:07:53Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for tpm2-0-tss</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for tpm2-0-tss fixes the following issues:

- CVE-2023-22745: Fixed a memory safety issue that could be exploited
  by local attackers with TPM access (bsc#1207325).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2023-613,SUSE-SLE-Product-RT-15-SP3-2023-613,openSUSE-SLE-15.4-2023-613</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230613-1/</URL>
      <Description>Link for SUSE-SU-2023:0613-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2023-March/013966.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:0613-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1207325</URL>
      <Description>SUSE Bug 1207325</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-22745/</URL>
      <Description>SUSE CVE CVE-2023-22745 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Real Time 15 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Real Time 15 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Real Time 15 SP3" CPE="cpe:/o:suse:sle_rt:15:sp3">SUSE Linux Enterprise Real Time 15 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.4">
      <Branch Type="Product Name" Name="openSUSE Leap 15.4">
        <FullProductName ProductID="openSUSE Leap 15.4" CPE="cpe:/o:opensuse:leap:15.4">openSUSE Leap 15.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libtss2-esys0-2.4.5-150300.3.6.1">
      <FullProductName ProductID="libtss2-esys0-2.4.5-150300.3.6.1">libtss2-esys0-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtss2-esys0-32bit-2.4.5-150300.3.6.1">
      <FullProductName ProductID="libtss2-esys0-32bit-2.4.5-150300.3.6.1">libtss2-esys0-32bit-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtss2-esys0-64bit-2.4.5-150300.3.6.1">
      <FullProductName ProductID="libtss2-esys0-64bit-2.4.5-150300.3.6.1">libtss2-esys0-64bit-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtss2-fapi0-2.4.5-150300.3.6.1">
      <FullProductName ProductID="libtss2-fapi0-2.4.5-150300.3.6.1">libtss2-fapi0-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtss2-mu0-2.4.5-150300.3.6.1">
      <FullProductName ProductID="libtss2-mu0-2.4.5-150300.3.6.1">libtss2-mu0-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtss2-mu0-32bit-2.4.5-150300.3.6.1">
      <FullProductName ProductID="libtss2-mu0-32bit-2.4.5-150300.3.6.1">libtss2-mu0-32bit-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtss2-mu0-64bit-2.4.5-150300.3.6.1">
      <FullProductName ProductID="libtss2-mu0-64bit-2.4.5-150300.3.6.1">libtss2-mu0-64bit-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtss2-rc0-2.4.5-150300.3.6.1">
      <FullProductName ProductID="libtss2-rc0-2.4.5-150300.3.6.1">libtss2-rc0-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtss2-sys0-2.4.5-150300.3.6.1">
      <FullProductName ProductID="libtss2-sys0-2.4.5-150300.3.6.1">libtss2-sys0-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtss2-sys0-32bit-2.4.5-150300.3.6.1">
      <FullProductName ProductID="libtss2-sys0-32bit-2.4.5-150300.3.6.1">libtss2-sys0-32bit-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtss2-sys0-64bit-2.4.5-150300.3.6.1">
      <FullProductName ProductID="libtss2-sys0-64bit-2.4.5-150300.3.6.1">libtss2-sys0-64bit-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtss2-tcti-device0-2.4.5-150300.3.6.1">
      <FullProductName ProductID="libtss2-tcti-device0-2.4.5-150300.3.6.1">libtss2-tcti-device0-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtss2-tcti-device0-32bit-2.4.5-150300.3.6.1">
      <FullProductName ProductID="libtss2-tcti-device0-32bit-2.4.5-150300.3.6.1">libtss2-tcti-device0-32bit-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtss2-tcti-device0-64bit-2.4.5-150300.3.6.1">
      <FullProductName ProductID="libtss2-tcti-device0-64bit-2.4.5-150300.3.6.1">libtss2-tcti-device0-64bit-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtss2-tcti-mssim0-2.4.5-150300.3.6.1">
      <FullProductName ProductID="libtss2-tcti-mssim0-2.4.5-150300.3.6.1">libtss2-tcti-mssim0-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtss2-tcti-mssim0-32bit-2.4.5-150300.3.6.1">
      <FullProductName ProductID="libtss2-tcti-mssim0-32bit-2.4.5-150300.3.6.1">libtss2-tcti-mssim0-32bit-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtss2-tcti-mssim0-64bit-2.4.5-150300.3.6.1">
      <FullProductName ProductID="libtss2-tcti-mssim0-64bit-2.4.5-150300.3.6.1">libtss2-tcti-mssim0-64bit-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtss2-tctildr0-2.4.5-150300.3.6.1">
      <FullProductName ProductID="libtss2-tctildr0-2.4.5-150300.3.6.1">libtss2-tctildr0-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tpm2-0-tss-2.4.5-150300.3.6.1">
      <FullProductName ProductID="tpm2-0-tss-2.4.5-150300.3.6.1">tpm2-0-tss-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tpm2-0-tss-devel-2.4.5-150300.3.6.1">
      <FullProductName ProductID="tpm2-0-tss-devel-2.4.5-150300.3.6.1">tpm2-0-tss-devel-2.4.5-150300.3.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libtss2-esys0-2.4.5-150300.3.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Real Time 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Real Time 15 SP3:libtss2-esys0-2.4.5-150300.3.6.1">libtss2-esys0-2.4.5-150300.3.6.1 as a component of SUSE Linux Enterprise Real Time 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtss2-fapi0-2.4.5-150300.3.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Real Time 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Real Time 15 SP3:libtss2-fapi0-2.4.5-150300.3.6.1">libtss2-fapi0-2.4.5-150300.3.6.1 as a component of SUSE Linux Enterprise Real Time 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtss2-mu0-2.4.5-150300.3.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Real Time 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Real Time 15 SP3:libtss2-mu0-2.4.5-150300.3.6.1">libtss2-mu0-2.4.5-150300.3.6.1 as a component of SUSE Linux Enterprise Real Time 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtss2-rc0-2.4.5-150300.3.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Real Time 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Real Time 15 SP3:libtss2-rc0-2.4.5-150300.3.6.1">libtss2-rc0-2.4.5-150300.3.6.1 as a component of SUSE Linux Enterprise Real Time 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtss2-sys0-2.4.5-150300.3.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Real Time 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Real Time 15 SP3:libtss2-sys0-2.4.5-150300.3.6.1">libtss2-sys0-2.4.5-150300.3.6.1 as a component of SUSE Linux Enterprise Real Time 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtss2-tcti-device0-2.4.5-150300.3.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Real Time 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Real Time 15 SP3:libtss2-tcti-device0-2.4.5-150300.3.6.1">libtss2-tcti-device0-2.4.5-150300.3.6.1 as a component of SUSE Linux Enterprise Real Time 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtss2-tcti-mssim0-2.4.5-150300.3.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Real Time 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Real Time 15 SP3:libtss2-tcti-mssim0-2.4.5-150300.3.6.1">libtss2-tcti-mssim0-2.4.5-150300.3.6.1 as a component of SUSE Linux Enterprise Real Time 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtss2-tctildr0-2.4.5-150300.3.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Real Time 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Real Time 15 SP3:libtss2-tctildr0-2.4.5-150300.3.6.1">libtss2-tctildr0-2.4.5-150300.3.6.1 as a component of SUSE Linux Enterprise Real Time 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="tpm2-0-tss-2.4.5-150300.3.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Real Time 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Real Time 15 SP3:tpm2-0-tss-2.4.5-150300.3.6.1">tpm2-0-tss-2.4.5-150300.3.6.1 as a component of SUSE Linux Enterprise Real Time 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="tpm2-0-tss-devel-2.4.5-150300.3.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Real Time 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Real Time 15 SP3:tpm2-0-tss-devel-2.4.5-150300.3.6.1">tpm2-0-tss-devel-2.4.5-150300.3.6.1 as a component of SUSE Linux Enterprise Real Time 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtss2-fapi0-2.4.5-150300.3.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:libtss2-fapi0-2.4.5-150300.3.6.1">libtss2-fapi0-2.4.5-150300.3.6.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtss2-sys0-2.4.5-150300.3.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:libtss2-sys0-2.4.5-150300.3.6.1">libtss2-sys0-2.4.5-150300.3.6.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtss2-sys0-32bit-2.4.5-150300.3.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:libtss2-sys0-32bit-2.4.5-150300.3.6.1">libtss2-sys0-32bit-2.4.5-150300.3.6.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
  </ProductTree>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In versions prior to 4.1.0-rc0, 4.0.1, and 3.2.2-rc1, `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege. Versions 4.1.0-rc0, 4.0.1, and 3.2.2-rc1 fix the issue.</Note>
    </Notes>
    <CVE>CVE-2023-22745</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Real Time 15 SP3:libtss2-esys0-2.4.5-150300.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Real Time 15 SP3:libtss2-fapi0-2.4.5-150300.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Real Time 15 SP3:libtss2-mu0-2.4.5-150300.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Real Time 15 SP3:libtss2-rc0-2.4.5-150300.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Real Time 15 SP3:libtss2-sys0-2.4.5-150300.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Real Time 15 SP3:libtss2-tcti-device0-2.4.5-150300.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Real Time 15 SP3:libtss2-tcti-mssim0-2.4.5-150300.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Real Time 15 SP3:libtss2-tctildr0-2.4.5-150300.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Real Time 15 SP3:tpm2-0-tss-2.4.5-150300.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Real Time 15 SP3:tpm2-0-tss-devel-2.4.5-150300.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.4:libtss2-fapi0-2.4.5-150300.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.4:libtss2-sys0-2.4.5-150300.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.4:libtss2-sys0-32bit-2.4.5-150300.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV3>
        <BaseScoreV3>6.4</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230613-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-22745.html</URL>
        <Description>CVE-2023-22745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207325</URL>
        <Description>SUSE Bug 1207325</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
</cvrfdoc>
