A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1976806 | Issue Tracking Patch Third Party Advisory |
https://github.com/stefanberger/libtpms/commit/2e6173c | Patch Third Party Advisory |
https://github.com/stefanberger/libtpms/commit/2f30d62 | Patch Third Party Advisory |
https://github.com/stefanberger/libtpms/commit/7981d9a | Patch Third Party Advisory |
https://github.com/stefanberger/libtpms/pull/223 | Issue Tracking Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7KZSYMTE7Z4BBEZUWO2DIMQDWMGEP46/ |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
29 Nov 2022, 16:57
Type | Values Removed | Values Added |
---|---|---|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7KZSYMTE7Z4BBEZUWO2DIMQDWMGEP46/ - Mailing List, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 3.6
v3 : 6.1 |
CPE | cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* |
23 May 2022, 18:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Mar 2022, 01:40
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
References | (MISC) https://github.com/stefanberger/libtpms/commit/2e6173c - Patch, Third Party Advisory | |
References | (MISC) https://github.com/stefanberger/libtpms/commit/2f30d62 - Patch, Third Party Advisory | |
References | (MISC) https://github.com/stefanberger/libtpms/pull/223 - Issue Tracking, Third Party Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1976806 - Issue Tracking, Patch, Third Party Advisory | |
References | (MISC) https://github.com/stefanberger/libtpms/commit/7981d9a - Patch, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.4
v3 : 8.2 |
CPE | cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:* cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:* |
02 Mar 2022, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-03-02 23:15
Updated : 2024-02-04 22:29
NVD link : CVE-2021-3623
Mitre link : CVE-2021-3623
CVE.ORG link : CVE-2021-3623
JSON object : View
Products Affected
redhat
- enterprise_linux
libtpms_project
- libtpms
fedoraproject
- fedora
CWE
CWE-787
Out-of-bounds Write