Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2022-03-22 |
libtpms
[0.8.8-1.el7]
- spec: Update spec file to version 0.8.8
* Fri Sep 17 2021 Stefan Berger - 0.8.7-1
- tpm2: Fixes for building and running with OpenSSL 3.0
* Fri Sep 10 2021 Stefan Berger - 0.8.6-1
- tpm2: Marshal event sequence objects' hash state
* Wed Sep 01 2021 Stefan Berger - 0.8.5-1
- tpm2: NVMarshal: Handle index orderly RAM without 0-sized terminating node
- tpm2: Initialize a whole OBJECT before using it
* Wed Jun 23 2021 Stefan Berger - 0.8.4-1
- tpm2: Reset too large size indicators in TPM2B to avoid access beyond buffer
* Tue Jun 01 2021 Stefan Berger - 0.8.3-1
- tpm2: Work-around for Windows 2016 & 2019 bug related to ContextLoad
swtpm
[0.3.4-5.el7]
- swtpm: Check header size indicator against expected size (CID 375869) (Stefan
Berger) [Orabug: 33876933] {CVE-2022-23645}
CVE-2022-23645 |
CVE-2021-3623 |
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle Linux 7 (x86_64) | libtpms-0.8.8-1.el7.src.rpm | 6fa928c1d2a6c8b7e14dda31e58cd6e8492bb6196519b191fccfd848d2107a4d | - | ol7_x86_64_kvm_utils |
swtpm-0.3.4-5.el7.src.rpm | 5a704ba4d82450b89f761caded934a4958df4d182af1f7af30b38a08ffa98335 | - | ol7_x86_64_kvm_utils | |
libtpms-0.8.8-1.el7.x86_64.rpm | 49b3705dd4202b21f2fb0f25022e70d311121b77eb78efae11d4b626ba60ad3d | - | ol7_x86_64_kvm_utils | |
libtpms-devel-0.8.8-1.el7.x86_64.rpm | 2e4219c32b6de7c7051b9c91b142f76a8e61191cb358c92f82732cbe3454cb1b | - | ol7_x86_64_kvm_utils | |
swtpm-0.3.4-5.el7.x86_64.rpm | b3ad6ea83ff9e6221e6db41d1c85aafce0760d7090c51a4b93f06d161d4dff79 | - | ol7_x86_64_kvm_utils | |
swtpm-devel-0.3.4-5.el7.x86_64.rpm | c7aa78a04946fc4a28ee24d9f8ee6616026dc0a311b79f40e80e160c3766fef6 | - | ol7_x86_64_kvm_utils | |
swtpm-libs-0.3.4-5.el7.x86_64.rpm | 1fe579f6e032049e9d97eb455d2fcbc399491cde0675eebb070f61e48ba75cd0 | - | ol7_x86_64_kvm_utils | |
swtpm-tools-0.3.4-5.el7.x86_64.rpm | 6fd53d6daf270e7737f9fab81442581579d28ada71f85550d21a26c023f668e1 | - | ol7_x86_64_kvm_utils |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team