Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-3623 (GCVE-0-2021-3623)
Vulnerability from cvelistv5 – Published: 2022-03-02 22:02 – Updated: 2024-08-03 17:01
VLAI?
EPSS
Summary
A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.
Severity ?
No CVSS data available.
CWE
Assigner
References
6 references
| URL | Tags |
|---|---|
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
| https://bugzilla.redhat.com/show_bug.cgi?id=1976806 | x_refsource_MISC |
| https://github.com/stefanberger/libtpms/pull/223 | x_refsource_MISC |
| https://github.com/stefanberger/libtpms/commit/2f30d62 | x_refsource_MISC |
| https://github.com/stefanberger/libtpms/commit/7981d9a | x_refsource_MISC |
| https://github.com/stefanberger/libtpms/commit/2e6173c | x_refsource_MISC |
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:01:08.325Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "FEDORA-2021-465b5c3b67",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7KZSYMTE7Z4BBEZUWO2DIMQDWMGEP46/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976806"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/stefanberger/libtpms/pull/223"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/stefanberger/libtpms/commit/2f30d62"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/stefanberger/libtpms/commit/7981d9a"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/stefanberger/libtpms/commit/2e6173c"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "libtpms",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Fixed-In - libtpms 0.6.5, libtpms 0.7.8, libtpms 0.8.4"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-05-23T17:47:20.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "FEDORA-2021-465b5c3b67",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7KZSYMTE7Z4BBEZUWO2DIMQDWMGEP46/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976806"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/stefanberger/libtpms/pull/223"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/stefanberger/libtpms/commit/2f30d62"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/stefanberger/libtpms/commit/7981d9a"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/stefanberger/libtpms/commit/2e6173c"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2021-3623",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "libtpms",
"version": {
"version_data": [
{
"version_value": "Fixed-In - libtpms 0.6.5, libtpms 0.7.8, libtpms 0.8.4"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2021-465b5c3b67",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7KZSYMTE7Z4BBEZUWO2DIMQDWMGEP46/"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1976806",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976806"
},
{
"name": "https://github.com/stefanberger/libtpms/pull/223",
"refsource": "MISC",
"url": "https://github.com/stefanberger/libtpms/pull/223"
},
{
"name": "https://github.com/stefanberger/libtpms/commit/2f30d62",
"refsource": "MISC",
"url": "https://github.com/stefanberger/libtpms/commit/2f30d62"
},
{
"name": "https://github.com/stefanberger/libtpms/commit/7981d9a",
"refsource": "MISC",
"url": "https://github.com/stefanberger/libtpms/commit/7981d9a"
},
{
"name": "https://github.com/stefanberger/libtpms/commit/2e6173c",
"refsource": "MISC",
"url": "https://github.com/stefanberger/libtpms/commit/2e6173c"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2021-3623",
"datePublished": "2022-03-02T22:02:36.000Z",
"dateReserved": "2021-06-28T00:00:00.000Z",
"dateUpdated": "2024-08-03T17:01:08.325Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2021-3623",
"date": "2026-05-15",
"epss": "0.00053",
"percentile": "0.16641"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"0.6.5\", \"matchCriteriaId\": \"C3C197C5-7736-4A8E-B7A2-2DFE99DB50B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"0.7.0\", \"versionEndExcluding\": \"0.7.8\", \"matchCriteriaId\": \"1B9B0605-529C-43AB-8012-9838EDAE68BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"0.8.0\", \"versionEndExcluding\": \"0.8.4\", \"matchCriteriaId\": \"0041D79D-7D5A-45F0-B24C-6EBCC6C56855\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*\", \"matchCriteriaId\": \"3AA08768-75AF-4791-B229-AE938C780959\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A930E247-0B43-43CB-98FF-6CE7B8189835\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.\"}, {\"lang\": \"es\", \"value\": \"Se ha encontrado un fallo en libtpms. El fallo puede ser desencadenado por paquetes de comandos TPM 2 especialmente dise\\u00f1ados que contengan valores ilegales y puede conllevar a un acceso fuera de l\\u00edmites cuando el estado vol\\u00e1til del TPM 2 es marshalled/written o unmarshalled/read. La mayor amenaza de esta vulnerabilidad es la disponibilidad del sistema\"}]",
"id": "CVE-2021-3623",
"lastModified": "2024-11-21T06:22:00.440",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 4.2}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:N/A:P\", \"baseScore\": 3.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.9, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2022-03-02T23:15:08.623",
"references": "[{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1976806\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/stefanberger/libtpms/commit/2e6173c\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/stefanberger/libtpms/commit/2f30d62\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/stefanberger/libtpms/commit/7981d9a\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/stefanberger/libtpms/pull/223\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7KZSYMTE7Z4BBEZUWO2DIMQDWMGEP46/\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1976806\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/stefanberger/libtpms/commit/2e6173c\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/stefanberger/libtpms/commit/2f30d62\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/stefanberger/libtpms/commit/7981d9a\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/stefanberger/libtpms/pull/223\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7KZSYMTE7Z4BBEZUWO2DIMQDWMGEP46/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-3623\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2022-03-02T23:15:08.623\",\"lastModified\":\"2024-11-21T06:22:00.440\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado un fallo en libtpms. El fallo puede ser desencadenado por paquetes de comandos TPM 2 especialmente dise\u00f1ados que contengan valores ilegales y puede conllevar a un acceso fuera de l\u00edmites cuando el estado vol\u00e1til del TPM 2 es marshalled/written o unmarshalled/read. La mayor amenaza de esta vulnerabilidad es la disponibilidad del sistema\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":4.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:P\",\"baseScore\":3.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.6.5\",\"matchCriteriaId\":\"C3C197C5-7736-4A8E-B7A2-2DFE99DB50B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.7.0\",\"versionEndExcluding\":\"0.7.8\",\"matchCriteriaId\":\"1B9B0605-529C-43AB-8012-9838EDAE68BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.8.0\",\"versionEndExcluding\":\"0.8.4\",\"matchCriteriaId\":\"0041D79D-7D5A-45F0-B24C-6EBCC6C56855\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*\",\"matchCriteriaId\":\"3AA08768-75AF-4791-B229-AE938C780959\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1976806\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/stefanberger/libtpms/commit/2e6173c\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/stefanberger/libtpms/commit/2f30d62\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/stefanberger/libtpms/commit/7981d9a\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/stefanberger/libtpms/pull/223\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7KZSYMTE7Z4BBEZUWO2DIMQDWMGEP46/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1976806\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/stefanberger/libtpms/commit/2e6173c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/stefanberger/libtpms/commit/2f30d62\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/stefanberger/libtpms/commit/7981d9a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/stefanberger/libtpms/pull/223\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7KZSYMTE7Z4BBEZUWO2DIMQDWMGEP46/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
FKIE_CVE-2021-3623
Vulnerability from fkie_nvd - Published: 2022-03-02 23:15 - Updated: 2024-11-21 06:22
Severity ?
Summary
A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| libtpms_project | libtpms | * | |
| libtpms_project | libtpms | * | |
| libtpms_project | libtpms | * | |
| redhat | enterprise_linux | 8.0 | |
| fedoraproject | fedora | 34 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3C197C5-7736-4A8E-B7A2-2DFE99DB50B1",
"versionEndExcluding": "0.6.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1B9B0605-529C-43AB-8012-9838EDAE68BA",
"versionEndExcluding": "0.7.8",
"versionStartIncluding": "0.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0041D79D-7D5A-45F0-B24C-6EBCC6C56855",
"versionEndExcluding": "0.8.4",
"versionStartIncluding": "0.8.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*",
"matchCriteriaId": "3AA08768-75AF-4791-B229-AE938C780959",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability."
},
{
"lang": "es",
"value": "Se ha encontrado un fallo en libtpms. El fallo puede ser desencadenado por paquetes de comandos TPM 2 especialmente dise\u00f1ados que contengan valores ilegales y puede conllevar a un acceso fuera de l\u00edmites cuando el estado vol\u00e1til del TPM 2 es marshalled/written o unmarshalled/read. La mayor amenaza de esta vulnerabilidad es la disponibilidad del sistema"
}
],
"id": "CVE-2021-3623",
"lastModified": "2024-11-21T06:22:00.440",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 4.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-03-02T23:15:08.623",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976806"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/stefanberger/libtpms/commit/2e6173c"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/stefanberger/libtpms/commit/2f30d62"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/stefanberger/libtpms/commit/7981d9a"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stefanberger/libtpms/pull/223"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7KZSYMTE7Z4BBEZUWO2DIMQDWMGEP46/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976806"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/stefanberger/libtpms/commit/2e6173c"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/stefanberger/libtpms/commit/2f30d62"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/stefanberger/libtpms/commit/7981d9a"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stefanberger/libtpms/pull/223"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7KZSYMTE7Z4BBEZUWO2DIMQDWMGEP46/"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2021-3623
Vulnerability from gsd - Updated: 2023-12-13 01:23Details
A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2021-3623",
"description": "A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.",
"id": "GSD-2021-3623",
"references": [
"https://www.suse.com/security/cve/CVE-2021-3623.html",
"https://advisories.mageia.org/CVE-2021-3623.html",
"https://security.archlinux.org/CVE-2021-3623",
"https://linux.oracle.com/cve/CVE-2021-3623.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-3623"
],
"details": "A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.",
"id": "GSD-2021-3623",
"modified": "2023-12-13T01:23:34.984948Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2021-3623",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "libtpms",
"version": {
"version_data": [
{
"version_value": "Fixed-In - libtpms 0.6.5, libtpms 0.7.8, libtpms 0.8.4"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": " CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2021-465b5c3b67",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7KZSYMTE7Z4BBEZUWO2DIMQDWMGEP46/"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1976806",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976806"
},
{
"name": "https://github.com/stefanberger/libtpms/pull/223",
"refsource": "MISC",
"url": "https://github.com/stefanberger/libtpms/pull/223"
},
{
"name": "https://github.com/stefanberger/libtpms/commit/2f30d62",
"refsource": "MISC",
"url": "https://github.com/stefanberger/libtpms/commit/2f30d62"
},
{
"name": "https://github.com/stefanberger/libtpms/commit/7981d9a",
"refsource": "MISC",
"url": "https://github.com/stefanberger/libtpms/commit/7981d9a"
},
{
"name": "https://github.com/stefanberger/libtpms/commit/2e6173c",
"refsource": "MISC",
"url": "https://github.com/stefanberger/libtpms/commit/2e6173c"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "0.8.4",
"versionStartIncluding": "0.8.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "0.7.8",
"versionStartIncluding": "0.7.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "0.6.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2021-3623"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/stefanberger/libtpms/pull/223",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stefanberger/libtpms/pull/223"
},
{
"name": "https://github.com/stefanberger/libtpms/commit/2e6173c",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/stefanberger/libtpms/commit/2e6173c"
},
{
"name": "https://github.com/stefanberger/libtpms/commit/7981d9a",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/stefanberger/libtpms/commit/7981d9a"
},
{
"name": "https://github.com/stefanberger/libtpms/commit/2f30d62",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/stefanberger/libtpms/commit/2f30d62"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1976806",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976806"
},
{
"name": "FEDORA-2021-465b5c3b67",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7KZSYMTE7Z4BBEZUWO2DIMQDWMGEP46/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 4.2
}
},
"lastModifiedDate": "2022-11-29T16:57Z",
"publishedDate": "2022-03-02T23:15Z"
}
}
}
OPENSUSE-SU-2024:12445-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
libtpms-devel-0.9.3-2.1 on GA media
Severity
Moderate
Notes
Title of the patch: libtpms-devel-0.9.3-2.1 on GA media
Description of the patch: These are all security issues fixed in the libtpms-devel-0.9.3-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-12445
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6.1 (Medium)
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtpms0-0.9.3-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtpms0-0.9.3-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtpms0-0.9.3-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libtpms0-0.9.3-2.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
5 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libtpms-devel-0.9.3-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libtpms-devel-0.9.3-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12445",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12445-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3623 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3623/"
}
],
"title": "libtpms-devel-0.9.3-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12445-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libtpms-devel-0.9.3-2.1.aarch64",
"product": {
"name": "libtpms-devel-0.9.3-2.1.aarch64",
"product_id": "libtpms-devel-0.9.3-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libtpms0-0.9.3-2.1.aarch64",
"product": {
"name": "libtpms0-0.9.3-2.1.aarch64",
"product_id": "libtpms0-0.9.3-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtpms-devel-0.9.3-2.1.ppc64le",
"product": {
"name": "libtpms-devel-0.9.3-2.1.ppc64le",
"product_id": "libtpms-devel-0.9.3-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libtpms0-0.9.3-2.1.ppc64le",
"product": {
"name": "libtpms0-0.9.3-2.1.ppc64le",
"product_id": "libtpms0-0.9.3-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libtpms-devel-0.9.3-2.1.s390x",
"product": {
"name": "libtpms-devel-0.9.3-2.1.s390x",
"product_id": "libtpms-devel-0.9.3-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libtpms0-0.9.3-2.1.s390x",
"product": {
"name": "libtpms0-0.9.3-2.1.s390x",
"product_id": "libtpms0-0.9.3-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libtpms-devel-0.9.3-2.1.x86_64",
"product": {
"name": "libtpms-devel-0.9.3-2.1.x86_64",
"product_id": "libtpms-devel-0.9.3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtpms0-0.9.3-2.1.x86_64",
"product": {
"name": "libtpms0-0.9.3-2.1.x86_64",
"product_id": "libtpms0-0.9.3-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.9.3-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.aarch64"
},
"product_reference": "libtpms-devel-0.9.3-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.9.3-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.ppc64le"
},
"product_reference": "libtpms-devel-0.9.3-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.9.3-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.s390x"
},
"product_reference": "libtpms-devel-0.9.3-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.9.3-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.x86_64"
},
"product_reference": "libtpms-devel-0.9.3-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.9.3-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libtpms0-0.9.3-2.1.aarch64"
},
"product_reference": "libtpms0-0.9.3-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.9.3-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libtpms0-0.9.3-2.1.ppc64le"
},
"product_reference": "libtpms0-0.9.3-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.9.3-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libtpms0-0.9.3-2.1.s390x"
},
"product_reference": "libtpms0-0.9.3-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.9.3-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libtpms0-0.9.3-2.1.x86_64"
},
"product_reference": "libtpms0-0.9.3-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3623"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.aarch64",
"openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.ppc64le",
"openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.s390x",
"openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.x86_64",
"openSUSE Tumbleweed:libtpms0-0.9.3-2.1.aarch64",
"openSUSE Tumbleweed:libtpms0-0.9.3-2.1.ppc64le",
"openSUSE Tumbleweed:libtpms0-0.9.3-2.1.s390x",
"openSUSE Tumbleweed:libtpms0-0.9.3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3623",
"url": "https://www.suse.com/security/cve/CVE-2021-3623"
},
{
"category": "external",
"summary": "SUSE Bug 1187767 for CVE-2021-3623",
"url": "https://bugzilla.suse.com/1187767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.aarch64",
"openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.ppc64le",
"openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.s390x",
"openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.x86_64",
"openSUSE Tumbleweed:libtpms0-0.9.3-2.1.aarch64",
"openSUSE Tumbleweed:libtpms0-0.9.3-2.1.ppc64le",
"openSUSE Tumbleweed:libtpms0-0.9.3-2.1.s390x",
"openSUSE Tumbleweed:libtpms0-0.9.3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.aarch64",
"openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.ppc64le",
"openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.s390x",
"openSUSE Tumbleweed:libtpms-devel-0.9.3-2.1.x86_64",
"openSUSE Tumbleweed:libtpms0-0.9.3-2.1.aarch64",
"openSUSE Tumbleweed:libtpms0-0.9.3-2.1.ppc64le",
"openSUSE Tumbleweed:libtpms0-0.9.3-2.1.s390x",
"openSUSE Tumbleweed:libtpms0-0.9.3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3623"
}
]
}
SUSE-SU-2022:4457-1
Vulnerability from csaf_suse - Published: 2022-12-13 12:11 - Updated: 2022-12-13 12:11Summary
Security update for libtpms
Severity
Moderate
Notes
Title of the patch: Security update for libtpms
Description of the patch: This update for libtpms fixes the following issues:
- CVE-2021-3623: Fixed out-of-bounds access when trying to resume the
state of the vTPM (bsc#1187767)
Patchnames: SUSE-2022-4457,SUSE-SLE-Micro-5.3-2022-4457,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4457,SUSE-SLE-Module-Server-Applications-15-SP4-2022-4457,SUSE-SUSE-MicroOS-5.1-2022-4457,SUSE-SUSE-MicroOS-5.2-2022-4457,openSUSE-Leap-Micro-5.2-2022-4457,openSUSE-Leap-Micro-5.3-2022-4457,openSUSE-SLE-15.3-2022-4457,openSUSE-SLE-15.4-2022-4457
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6.1 (Medium)
Affected products
Recommended
45 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Micro 5.1:libtpms0-0.8.2-150300.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.1:libtpms0-0.8.2-150300.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.1:libtpms0-0.8.2-150300.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:libtpms0-0.8.2-150300.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:libtpms0-0.8.2-150300.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.2:libtpms0-0.8.2-150300.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:libtpms0-0.8.2-150300.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:libtpms0-0.8.2-150300.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:libtpms0-0.8.2-150300.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap Micro 5.2:libtpms0-0.8.2-150300.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap Micro 5.2:libtpms0-0.8.2-150300.3.6.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap Micro 5.3:libtpms0-0.8.2-150300.3.6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap Micro 5.3:libtpms0-0.8.2-150300.3.6.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
9 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libtpms",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libtpms fixes the following issues:\n\n- CVE-2021-3623: Fixed out-of-bounds access when trying to resume the\n state of the vTPM (bsc#1187767)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-4457,SUSE-SLE-Micro-5.3-2022-4457,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4457,SUSE-SLE-Module-Server-Applications-15-SP4-2022-4457,SUSE-SUSE-MicroOS-5.1-2022-4457,SUSE-SUSE-MicroOS-5.2-2022-4457,openSUSE-Leap-Micro-5.2-2022-4457,openSUSE-Leap-Micro-5.3-2022-4457,openSUSE-SLE-15.3-2022-4457,openSUSE-SLE-15.4-2022-4457",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4457-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:4457-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20224457-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:4457-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013225.html"
},
{
"category": "self",
"summary": "SUSE Bug 1187767",
"url": "https://bugzilla.suse.com/1187767"
},
{
"category": "self",
"summary": "SUSE Bug 1204556",
"url": "https://bugzilla.suse.com/1204556"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3623 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3623/"
}
],
"title": "Security update for libtpms",
"tracking": {
"current_release_date": "2022-12-13T12:11:01Z",
"generator": {
"date": "2022-12-13T12:11:01Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:4457-1",
"initial_release_date": "2022-12-13T12:11:01Z",
"revision_history": [
{
"date": "2022-12-13T12:11:01Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libtpms-devel-0.8.2-150300.3.6.1.aarch64",
"product": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.aarch64",
"product_id": "libtpms-devel-0.8.2-150300.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "libtpms0-0.8.2-150300.3.6.1.aarch64",
"product": {
"name": "libtpms0-0.8.2-150300.3.6.1.aarch64",
"product_id": "libtpms0-0.8.2-150300.3.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtpms-devel-0.8.2-150300.3.6.1.i586",
"product": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.i586",
"product_id": "libtpms-devel-0.8.2-150300.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "libtpms0-0.8.2-150300.3.6.1.i586",
"product": {
"name": "libtpms0-0.8.2-150300.3.6.1.i586",
"product_id": "libtpms0-0.8.2-150300.3.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libtpms-devel-0.8.2-150300.3.6.1.ppc64le",
"product": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.ppc64le",
"product_id": "libtpms-devel-0.8.2-150300.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libtpms0-0.8.2-150300.3.6.1.ppc64le",
"product": {
"name": "libtpms0-0.8.2-150300.3.6.1.ppc64le",
"product_id": "libtpms0-0.8.2-150300.3.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libtpms-devel-0.8.2-150300.3.6.1.s390x",
"product": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.s390x",
"product_id": "libtpms-devel-0.8.2-150300.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "libtpms0-0.8.2-150300.3.6.1.s390x",
"product": {
"name": "libtpms0-0.8.2-150300.3.6.1.s390x",
"product_id": "libtpms0-0.8.2-150300.3.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libtpms-devel-0.8.2-150300.3.6.1.x86_64",
"product": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.x86_64",
"product_id": "libtpms-devel-0.8.2-150300.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtpms0-0.8.2-150300.3.6.1.x86_64",
"product": {
"name": "libtpms0-0.8.2-150300.3.6.1.x86_64",
"product_id": "libtpms0-0.8.2-150300.3.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.2",
"product": {
"name": "openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.2"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libtpms0-0.8.2-150300.3.6.1.aarch64"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libtpms0-0.8.2-150300.3.6.1.s390x"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libtpms0-0.8.2-150300.3.6.1.x86_64"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.aarch64"
},
"product_reference": "libtpms-devel-0.8.2-150300.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.ppc64le"
},
"product_reference": "libtpms-devel-0.8.2-150300.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.s390x"
},
"product_reference": "libtpms-devel-0.8.2-150300.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.x86_64"
},
"product_reference": "libtpms-devel-0.8.2-150300.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.aarch64"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.ppc64le"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.s390x"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.x86_64"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.aarch64"
},
"product_reference": "libtpms-devel-0.8.2-150300.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.ppc64le"
},
"product_reference": "libtpms-devel-0.8.2-150300.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.s390x"
},
"product_reference": "libtpms-devel-0.8.2-150300.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.x86_64"
},
"product_reference": "libtpms-devel-0.8.2-150300.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.aarch64"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.ppc64le"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.s390x"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.x86_64"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libtpms0-0.8.2-150300.3.6.1.aarch64"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libtpms0-0.8.2-150300.3.6.1.s390x"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libtpms0-0.8.2-150300.3.6.1.x86_64"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libtpms0-0.8.2-150300.3.6.1.aarch64"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libtpms0-0.8.2-150300.3.6.1.s390x"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libtpms0-0.8.2-150300.3.6.1.x86_64"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.aarch64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:libtpms0-0.8.2-150300.3.6.1.aarch64"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.x86_64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:libtpms0-0.8.2-150300.3.6.1.x86_64"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.aarch64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:libtpms0-0.8.2-150300.3.6.1.aarch64"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.x86_64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:libtpms0-0.8.2-150300.3.6.1.x86_64"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.aarch64"
},
"product_reference": "libtpms-devel-0.8.2-150300.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.ppc64le"
},
"product_reference": "libtpms-devel-0.8.2-150300.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.s390x"
},
"product_reference": "libtpms-devel-0.8.2-150300.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.x86_64"
},
"product_reference": "libtpms-devel-0.8.2-150300.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.aarch64"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.ppc64le"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.s390x"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.x86_64"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.aarch64"
},
"product_reference": "libtpms-devel-0.8.2-150300.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.ppc64le"
},
"product_reference": "libtpms-devel-0.8.2-150300.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.s390x"
},
"product_reference": "libtpms-devel-0.8.2-150300.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms-devel-0.8.2-150300.3.6.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.x86_64"
},
"product_reference": "libtpms-devel-0.8.2-150300.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.aarch64"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.ppc64le"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.s390x"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtpms0-0.8.2-150300.3.6.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.x86_64"
},
"product_reference": "libtpms0-0.8.2-150300.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3623"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:libtpms0-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libtpms0-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libtpms0-0.8.2-150300.3.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libtpms0-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtpms0-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtpms0-0.8.2-150300.3.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtpms0-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtpms0-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtpms0-0.8.2-150300.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.x86_64",
"openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.aarch64",
"openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.ppc64le",
"openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.s390x",
"openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.x86_64",
"openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.aarch64",
"openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.ppc64le",
"openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.s390x",
"openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.x86_64",
"openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.aarch64",
"openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.ppc64le",
"openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.s390x",
"openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.x86_64",
"openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.aarch64",
"openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.ppc64le",
"openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.s390x",
"openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.x86_64",
"openSUSE Leap Micro 5.2:libtpms0-0.8.2-150300.3.6.1.aarch64",
"openSUSE Leap Micro 5.2:libtpms0-0.8.2-150300.3.6.1.x86_64",
"openSUSE Leap Micro 5.3:libtpms0-0.8.2-150300.3.6.1.aarch64",
"openSUSE Leap Micro 5.3:libtpms0-0.8.2-150300.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3623",
"url": "https://www.suse.com/security/cve/CVE-2021-3623"
},
{
"category": "external",
"summary": "SUSE Bug 1187767 for CVE-2021-3623",
"url": "https://bugzilla.suse.com/1187767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:libtpms0-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libtpms0-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libtpms0-0.8.2-150300.3.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libtpms0-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtpms0-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtpms0-0.8.2-150300.3.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtpms0-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtpms0-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtpms0-0.8.2-150300.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.x86_64",
"openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.aarch64",
"openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.ppc64le",
"openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.s390x",
"openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.x86_64",
"openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.aarch64",
"openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.ppc64le",
"openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.s390x",
"openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.x86_64",
"openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.aarch64",
"openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.ppc64le",
"openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.s390x",
"openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.x86_64",
"openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.aarch64",
"openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.ppc64le",
"openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.s390x",
"openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.x86_64",
"openSUSE Leap Micro 5.2:libtpms0-0.8.2-150300.3.6.1.aarch64",
"openSUSE Leap Micro 5.2:libtpms0-0.8.2-150300.3.6.1.x86_64",
"openSUSE Leap Micro 5.3:libtpms0-0.8.2-150300.3.6.1.aarch64",
"openSUSE Leap Micro 5.3:libtpms0-0.8.2-150300.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:libtpms0-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libtpms0-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libtpms0-0.8.2-150300.3.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libtpms0-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtpms0-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtpms0-0.8.2-150300.3.6.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtpms0-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtpms0-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtpms0-0.8.2-150300.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms-devel-0.8.2-150300.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP3:libtpms0-0.8.2-150300.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms-devel-0.8.2-150300.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:libtpms0-0.8.2-150300.3.6.1.x86_64",
"openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.aarch64",
"openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.ppc64le",
"openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.s390x",
"openSUSE Leap 15.3:libtpms-devel-0.8.2-150300.3.6.1.x86_64",
"openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.aarch64",
"openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.ppc64le",
"openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.s390x",
"openSUSE Leap 15.3:libtpms0-0.8.2-150300.3.6.1.x86_64",
"openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.aarch64",
"openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.ppc64le",
"openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.s390x",
"openSUSE Leap 15.4:libtpms-devel-0.8.2-150300.3.6.1.x86_64",
"openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.aarch64",
"openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.ppc64le",
"openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.s390x",
"openSUSE Leap 15.4:libtpms0-0.8.2-150300.3.6.1.x86_64",
"openSUSE Leap Micro 5.2:libtpms0-0.8.2-150300.3.6.1.aarch64",
"openSUSE Leap Micro 5.2:libtpms0-0.8.2-150300.3.6.1.x86_64",
"openSUSE Leap Micro 5.3:libtpms0-0.8.2-150300.3.6.1.aarch64",
"openSUSE Leap Micro 5.3:libtpms0-0.8.2-150300.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-12-13T12:11:01Z",
"details": "moderate"
}
],
"title": "CVE-2021-3623"
}
]
}
BDU:2021-03392
Vulnerability from fstec - Published: 21.06.2021
VLAI Severity ?
Title
Уязвимость библиотеки libtpms, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать аварийное завершение системы или вызвать отказ в обслуживании
Description
Уязвимость библиотеки libtpms вызвана выходом операции за границы буфера в памяти. Эксплуатация уязвимости может позволить нарушителю вызвать аварийное завершение системы или вызвать отказ в обслуживании при помощи специально сформированного TPM 2 пакета
Severity ?
Vendor
Red Hat Inc., Сообщество свободного программного обеспечения
Software Name
Red Hat Enterprise Linux, libtpms
Software Version
8 (Red Hat Enterprise Linux), от 0.5.2 до 0.5.2.1 включительно (libtpms), от 0.6.0 до 0.6.4 включительно (libtpms), от 0.7.0 до 0.7.7 включительно (libtpms), от 0.8.0 до 0.8.3 включительно (libtpms)
Possible Mitigations
Обновление библиотеки libtpms до более новой версии.
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/cve-2021-3623
Reference
https://access.redhat.com/security/cve/cve-2021-3623
https://www.cybersecurity-help.cz/vdb/SB2021070128
https://www.suse.com/security/cve/CVE-2021-3623.html
https://github.com/stefanberger/libtpms/pull/223
https://github.com/stefanberger/libtpms/commit/2f30d62
https://github.com/stefanberger/libtpms/commit/7981d9a
https://github.com/stefanberger/libtpms/commit/2e6173c
CWE
CWE-119, CWE-125
{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "8 (Red Hat Enterprise Linux), \u043e\u0442 0.5.2 \u0434\u043e 0.5.2.1 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (libtpms), \u043e\u0442 0.6.0 \u0434\u043e 0.6.4 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (libtpms), \u043e\u0442 0.7.0 \u0434\u043e 0.7.7 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (libtpms), \u043e\u0442 0.8.0 \u0434\u043e 0.8.3 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (libtpms)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 libtpms \u0434\u043e \u0431\u043e\u043b\u0435\u0435 \u043d\u043e\u0432\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438.\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2021-3623",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "21.06.2021",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "06.07.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "06.07.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-03392",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2021-3623",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, libtpms",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 8 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 libtpms, \u0432\u044b\u0437\u0432\u0430\u043d\u043d\u0430\u044f \u0432\u044b\u0445\u043e\u0434\u043e\u043c \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u0430\u0432\u0430\u0440\u0438\u0439\u043d\u043e\u0435 \u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0438\u043b\u0438 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0412\u044b\u0445\u043e\u0434 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 (CWE-119), \u0427\u0442\u0435\u043d\u0438\u0435 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 (CWE-125)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 libtpms \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u0432\u044b\u0445\u043e\u0434\u043e\u043c \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u0430\u0432\u0430\u0440\u0438\u0439\u043d\u043e\u0435 \u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0438\u043b\u0438 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u043f\u0440\u0438 \u043f\u043e\u043c\u043e\u0449\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e TPM 2 \u043f\u0430\u043a\u0435\u0442\u0430",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://access.redhat.com/security/cve/cve-2021-3623\nhttps://www.cybersecurity-help.cz/vdb/SB2021070128\nhttps://www.suse.com/security/cve/CVE-2021-3623.html\nhttps://github.com/stefanberger/libtpms/pull/223\nhttps://github.com/stefanberger/libtpms/commit/2f30d62\nhttps://github.com/stefanberger/libtpms/commit/7981d9a\nhttps://github.com/stefanberger/libtpms/commit/2e6173c",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-119, CWE-125",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 1,7)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,1)"
}
GHSA-6527-9QHC-39J4
Vulnerability from github – Published: 2022-03-04 00:00 – Updated: 2022-03-17 00:04
VLAI?
Details
A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.
Severity ?
8.2 (High)
{
"affected": [],
"aliases": [
"CVE-2021-3623"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-03-02T23:15:00Z",
"severity": "HIGH"
},
"details": "A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.",
"id": "GHSA-6527-9qhc-39j4",
"modified": "2022-03-17T00:04:02Z",
"published": "2022-03-04T00:00:22Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3623"
},
{
"type": "WEB",
"url": "https://github.com/stefanberger/libtpms/pull/223"
},
{
"type": "WEB",
"url": "https://github.com/stefanberger/libtpms/commit/2e6173c"
},
{
"type": "WEB",
"url": "https://github.com/stefanberger/libtpms/commit/2f30d62"
},
{
"type": "WEB",
"url": "https://github.com/stefanberger/libtpms/commit/7981d9a"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976806"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7KZSYMTE7Z4BBEZUWO2DIMQDWMGEP46"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…