Home

Description

In the Linux kernel, the following vulnerability has been resolved: tpm2-sessions: Fix out of range indexing in name_size 'name_size' does not have any range checks, and it just directly indexes with TPM_ALG_ID, which could lead into memory corruption at worst. Address the issue by only processing known values and returning -EINVAL for unrecognized values. Make also 'tpm_buf_append_name' and 'tpm_buf_fill_hmac_session' fallible so that errors are detected before causing any spurious TPM traffic. End also the authorization session on failure in both of the functions, as the session state would be then by definition corrupted.

PUBLISHED Reserved 2025-12-24 | Published 2026-01-13 | Updated 2026-02-09 | Assigner Linux

Product status

Default status
unaffected

1085b8276bb4239daa7008f0dcd5c973e4bd690f (git) before 47e676ce4d68f461dfcab906f6aeb254f7276deb
affected

1085b8276bb4239daa7008f0dcd5c973e4bd690f (git) before 04a3aa6e8c5f878cc51a8a1c90b6d3c54079bc43
affected

1085b8276bb4239daa7008f0dcd5c973e4bd690f (git) before 6e9722e9a7bfe1bbad649937c811076acf86e1fd
affected

Default status
affected

6.10
affected

Any version before 6.10
unaffected

6.12.66 (semver)
unaffected

6.18.3 (semver)
unaffected

6.19 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/47e676ce4d68f461dfcab906f6aeb254f7276deb

git.kernel.org/...c/04a3aa6e8c5f878cc51a8a1c90b6d3c54079bc43

git.kernel.org/...c/6e9722e9a7bfe1bbad649937c811076acf86e1fd

cve.org (CVE-2025-68792)

nvd.nist.gov (CVE-2025-68792)

Download JSON