A flaw was found in the libtpms code that may cause access beyond the boundary of internal buffers. The vulnerability is triggered by specially-crafted TPM2 command packets that then trigger the issue when the state of the TPM2's volatile state is written. The highest threat from this vulnerability is to system availability. This issue affects libtpms versions before 0.8.5, before 0.7.9 and before 0.6.6.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1998588 | Issue Tracking Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1998588 | Issue Tracking Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 06:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1998588 - Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2021-10-19 15:15
Updated : 2024-11-21 06:22
NVD link : CVE-2021-3746
Mitre link : CVE-2021-3746
CVE.ORG link : CVE-2021-3746
JSON object : View
Products Affected
libtpms_project
- libtpms
fedoraproject
- fedora
redhat
- enterprise_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer