Bug 2371585 (CVE-2025-49133)

Summary: CVE-2025-49133 libtpms: Libtpms Out-of-Bounds Read Vulnerability
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: CLOSED CURRENTRELEASE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: marcandre.lureau
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in libtpms. A heap buffer overflow can occur in the `tpms_parse_pssh` function when parsing a malformed Public Signature Key Exchange (PSK) structure. A local attacker can trigger this overflow by providing a crafted PSK structure to the library. This can lead to a denial of service or allow for arbitrary code execution.
Story Points: ---
Clone Of: Environment:
Last Closed: 2025-06-11 10:15:40 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2371651, 2371652    
Bug Blocks:    

Description OSIDB Bzimport 2025-06-10 20:01:31 UTC
Libtpms is a library that targets the integration of TPM functionality into hypervisors, primarily into Qemu. Libtpms, which is derived from the TPM 2.0 reference implementation code published by the Trusted Computing Group, is prone to a potential out of bounds (OOB) read vulnerability. The vulnerability occurs in the ‘CryptHmacSign’ function with an inconsistent pairing of the signKey and signScheme parameters, where the signKey is ALG_KEYEDHASH key and inScheme is an ECC or RSA scheme. The reported vulnerability is in the ‘CryptHmacSign’ function, which is defined in the "Part 4: Supporting Routines – Code" document, section "7.151 - /tpm/src/crypt/CryptUtil.c ". This vulnerability can be triggered from user-mode applications by sending malicious commands to a TPM 2.0/vTPM (swtpm) whose firmware is based on an affected TCG reference implementation. The effect on libtpms is that it will cause an abort due to the detection of the out-of-bounds access, thus for example making a vTPM (swtpm) unavailable to a VM. This vulnerability is fixed in 0.7.12, 0.8.10, 0.9.7, and 0.10.1.

Comment 4 errata-xmlrpc 2025-07-29 13:13:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:12100 https://access.redhat.com/errata/RHSA-2025:12100

Comment 5 errata-xmlrpc 2025-07-29 13:32:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2025:12112 https://access.redhat.com/errata/RHSA-2025:12112

Comment 6 errata-xmlrpc 2025-07-29 13:40:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:12111 https://access.redhat.com/errata/RHSA-2025:12111

Comment 7 errata-xmlrpc 2025-07-30 04:01:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:12234 https://access.redhat.com/errata/RHSA-2025:12234

Comment 8 errata-xmlrpc 2025-07-30 10:31:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2025:12293 https://access.redhat.com/errata/RHSA-2025:12293

Comment 9 errata-xmlrpc 2025-08-04 02:08:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:12527 https://access.redhat.com/errata/RHSA-2025:12527

Comment 10 errata-xmlrpc 2025-09-23 08:23:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:16428 https://access.redhat.com/errata/RHSA-2025:16428