A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.
| Product | Vendor | Version |
|---|---|---|
| Linux kernel | n/a | Fixed in 3.5.15 |