CVE-2021-3746

A flaw was found in the libtpms code that may cause access beyond the boundary of internal buffers. The vulnerability is triggered by specially-crafted TPM2 command packets that then trigger the issue when the state of the TPM2's volatile state is written. The highest threat from this vulnerability is to system availability. This issue affects libtpms versions before 0.8.5, before 0.7.9 and before 0.6.6.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 49%
VendorProductVersion
libtpms_projectlibtpms
0.6.0 ≤
𝑥
< 0.6.6
libtpms_projectlibtpms
0.7.0 ≤
𝑥
< 0.7.9
libtpms_projectlibtpms
0.8.0 ≤
𝑥
< 0.8.5
redhatenterprise_linux
8.0
redhatenterprise_linux
8.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libtpms
bookworm
0.9.2-3.1
fixed
sid
0.9.2-3.1
fixed
trixie
0.9.2-3.1
fixed
bookworm (security)
0.9.2-3.1~deb12u1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libtpms
jammy
not-affected
impish
ignored
hirsute
ignored
xenial
ignored
trusty
ignored