CVE-2025-68792
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
13/01/2026
Última modificación:
13/01/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tpm2-sessions: Fix out of range indexing in name_size<br />
<br />
&#39;name_size&#39; does not have any range checks, and it just directly indexes<br />
with TPM_ALG_ID, which could lead into memory corruption at worst.<br />
<br />
Address the issue by only processing known values and returning -EINVAL for<br />
unrecognized values.<br />
<br />
Make also &#39;tpm_buf_append_name&#39; and &#39;tpm_buf_fill_hmac_session&#39; fallible so<br />
that errors are detected before causing any spurious TPM traffic.<br />
<br />
End also the authorization session on failure in both of the functions, as<br />
the session state would be then by definition corrupted.



