Ubungozi ekusetshenzisweni kwesithenjwa se-TPM 2.0 okuvumela ukufinyelela kudatha ku-cryptochip

Kukhodi enereferensi yokusetshenziswa kokucaciswa kwe-TPM 2.0 (Trusted Platform Module) kuhlonzwe ubungozi (CVE-2023-1017, CVE-2023-1018) obuholela ekubhaleni noma ekufundweni kwedatha ngale kwemingcele yebhafa eyabiwe. Ukuhlaselwa kokusetshenziswa kwe-cryptoprocessor kusetshenziswa ikhodi esengozini kungase kuphumele ekukhishweni noma ekubhalweni phezu kolwazi olugcinwe ku-chip olufana nokhiye be-cryptographic. Amandla okubhala phezu kwedatha ku-firmware ye-TPM angasetshenziswa umhlaseli ukuhlela ukusetshenziswa kwekhodi yakhe kumongo we-TPM, lokho, ngokwesibonelo, engasetshenziswa ukuze kusetshenziswe izicabha ezingemuva ezisebenza ohlangothini lwe-TPM futhi ezingatholakali. ngohlelo lokusebenza.

Ubungozi bubangelwa ukuqinisekiswa okungalungile kosayizi wamapharamitha womsebenzi we-CryptParameterDecryption(), ovumela amabhayithi amabili ukuthi abhalwe noma afundwe ngale komngcele webhafa odluliselwe kumsebenzi we-ExecuteCommand() futhi oqukethe umyalo we-TPM2.0. Kuye ngokusetshenziswa kwe-firmware, amabhayithi amabili abhalwa ngaphezulu angonakalisa kokubili inkumbulo engasetshenzisiwe kanye nedatha noma izikhombi kusitaki.

Ukuba sengozini kusetshenziswa ngokuthumela imiyalo eklanywe ngokukhethekile kumojula ye-TPM (umhlaseli kufanele abe nokufinyelela kusixhumi esibonakalayo se-TPM). Izinkinga zaxazululwa kusibuyekezo sokucaciswa kwe-TPM 2.0 esikhishwe ngoJanuwari (1.59 Errata 1.4, 1.38 Errata 1.13, 1.16 Errata 1.6).

Umtapo wolwazi ovulekile we-libtpms, osetshenziselwa ukulingisa isofthiwe yamamojula we-TPM nokuhlanganiswa kokusekelwa kwe-TPM kuma-hypervisors, nawo usengcupheni. Ukuba sengozini kulungiswe ekukhishweni kwe-libtpms 0.9.6.

Source: opennet.ru

Engeza amazwana