A out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end of TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can lead to denial of service (crashing the TPM chip/process or rendering it unusable) and/or arbitrary code execution in the TPM context.
Created libtpms tracking bugs for this issue: Affects: fedora-all [bug 2174322]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:1833 https://access.redhat.com/errata/RHSA-2023:1833
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-1017
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2453 https://access.redhat.com/errata/RHSA-2023:2453