CVE-2021-3746
Published: 19 October 2021
A flaw was found in the libtpms code that may cause access beyond the boundary of internal buffers. The vulnerability is triggered by specially-crafted TPM2 command packets that then trigger the issue when the state of the TPM2's volatile state is written. The highest threat from this vulnerability is to system availability. This issue affects libtpms versions before 0.8.5, before 0.7.9 and before 0.6.6.
Priority
Status
Package | Release | Status |
---|---|---|
libtpms Launchpad, Ubuntu, Debian |
hirsute |
Ignored
(end of life)
|
impish |
Ignored
(end of life)
|
|
jammy |
Not vulnerable
(0.9.3-0ubuntu1)
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Released
(0.9.1-1)
|
|
xenial |
Ignored
(end of standard support)
|
|
Patches: upstream: https://github.com/stefanberger/libtpms/commit/1fb6cd9b8df05b5d6e381b31215193d6ada969df upstream: https://github.com/stefanberger/libtpms/commit/ea62fd9679f8c6fc5e79471b33cfbd8227bfed72 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |