安全公告详情

NS-SA-2024-0065

2024-09-03 09:34:51

简介

important: tpm2-tools/vim security update

严重级别

important

主题

An update for tpm2-tools/vim is now available for NewStart CGSL MAIN 6.02.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

tpm2-tools:
vim:


Security Fix(es):
tpm2-tools: A flaw was found in tpm2-tools. tpm2_import used a fixed AES key for the inner wrapper, potentially allowing a MITM attacker to unwrap the inner portion and reveal the key being imported. The highest threat from this vulnerability is to data confidentiality.(CVE-2021-3565)
tpm2-tools: bugfix
vim: A use-after-free vulnerability in vim could allow an attacker to input a specially crafted file leading to memory corruption and a potentially exploitable crash or code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-3796)
vim: A flaw was found in vim. A possible heap-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-3778)
vim: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.02.F2B12.

影响组件

  • tpm2-tools
  • vim

影响产品

  • CGSL MAIN 6.02

更新包

{"fix":[{"product":"CGSL MAIN 6.02","pkgs":[{"binary":["tpm2-tools-4.1.1-5.el8.x86_64.rpm"],"source":"tpm2-tools-4.1.1-5.el8.src.rpm"},{"binary":["vim-filesystem-8.0.1763-16.el8.noarch.rpm","vim-minimal-8.0.1763-16.el8.x86_64.rpm","vim-common-8.0.1763-16.el8.x86_64.rpm","vim-enhanced-8.0.1763-16.el8.x86_64.rpm"],"source":"vim-8.0.1763-16.el8.src.rpm"}]}]}

CVE

参考