CVE-2021-3746

A flaw was found in the libtpms code that may cause access beyond the boundary of internal buffers. The vulnerability is triggered by specially-crafted TPM2 command packets that then trigger the issue when the state of the TPM2's volatile state is written. The highest threat from this vulnerability is to system availability. This issue affects libtpms versions before 0.8.5, before 0.7.9 and before 0.6.6.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1998588 Issue Tracking Patch Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*
cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*
cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*

Information

Published : 2021-10-19 08:15

Updated : 2021-10-22 13:28


NVD link : CVE-2021-3746

Mitre link : CVE-2021-3746


JSON object : View

CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

Advertisement

dedicated server usa

Products Affected

redhat

  • enterprise_linux

libtpms_project

  • libtpms

fedoraproject

  • fedora