A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.
[
{
"vendor": "n/a",
"product": "Linux kernel",
"versions": [
{
"version": "Linux kernel versions prior to 5.18",
"status": "affected"
}
]
}
]