Fedora 33 : tpm2-tss (2020-1d3fcce2a3)

medium Nessus Plugin ID 141282

Language:

Synopsis

The remote Fedora host is missing a security update.

Description

tpm2-tss 3.0.1 changed or fixed :

• Fix CVE-2020-24455 FAPI PolicyPCR not instatiating correctly

• Note that all TPM object created with a PolicyPCR with the currentPcrs

• and currentPcrsAndBank options have been created with an incorrect policy

• that ommits PCR checks. All these objects have to be recreated!

• Fix bug in FAPI NV creation with custom index values

• Cleanup of leftover sessions in error cases in FAPI

• Better error messages in several FAPI errors

• Add checks to FAPI policy paths

• Add checks if FAPI is correctly provisioned

• Fix execution of FAPI policies in some cases

• Allow 0x prefixes for TPMU_HA in JSON encoding

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected tpm2-tss package.

See Also

https://bodhi.fedoraproject.org/updates/FEDORA-2020-1d3fcce2a3

Plugin Details

Severity: Medium

ID: 141282

File Name: fedora_2020-1d3fcce2a3.nasl

Version: 1.3

Type: local

Agent: unix

Published: 10/8/2020

Updated: 3/5/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.4

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2020-24455

CVSS v3

Risk Factor: Medium

Base Score: 6.7

Temporal Score: 5.8

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:tpm2-tss, cpe:/o:fedoraproject:fedora:33

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 9/27/2020

Vulnerability Publication Date: 2/26/2021

Reference Information

CVE: CVE-2020-24455