Логотип exploitDog
bind:"CVE-2022-23645" OR bind:"CVE-2021-3623"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2022-23645" OR bind:"CVE-2021-3623"

Количество 17

Количество 17

oracle-oval логотип

ELSA-2022-9240

около 3 лет назад

ELSA-2022-9240: libtpms security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2021-3623

больше 3 лет назад

A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2021-3623

около 4 лет назад

A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2021-3623

больше 3 лет назад

A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2021-3623

больше 3 лет назад

A flaw was found in libtpms. The flaw can be triggered by specially-cr ...

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2022-23645

больше 3 лет назад

swtpm is a libtpms-based TPM emulator with socket, character device, and Linux CUSE interface. Versions prior to 0.5.3, 0.6.2, and 0.7.1 are vulnerable to out-of-bounds read. A specially crafted header of swtpm's state, where the blobheader's hdrsize indicator has an invalid value, may cause an out-of-bounds access when the byte array representing the state of the TPM is accessed. This will likely crash swtpm or prevent it from starting since the state cannot be understood. Users should upgrade to swtpm v0.5.3, v0.6.2, or v0.7.1 to receive a patch. There are currently no known workarounds.

CVSS3: 6.2
EPSS: Низкий
redhat логотип

CVE-2022-23645

больше 3 лет назад

swtpm is a libtpms-based TPM emulator with socket, character device, and Linux CUSE interface. Versions prior to 0.5.3, 0.6.2, and 0.7.1 are vulnerable to out-of-bounds read. A specially crafted header of swtpm's state, where the blobheader's hdrsize indicator has an invalid value, may cause an out-of-bounds access when the byte array representing the state of the TPM is accessed. This will likely crash swtpm or prevent it from starting since the state cannot be understood. Users should upgrade to swtpm v0.5.3, v0.6.2, or v0.7.1 to receive a patch. There are currently no known workarounds.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2022-23645

больше 3 лет назад

swtpm is a libtpms-based TPM emulator with socket, character device, and Linux CUSE interface. Versions prior to 0.5.3, 0.6.2, and 0.7.1 are vulnerable to out-of-bounds read. A specially crafted header of swtpm's state, where the blobheader's hdrsize indicator has an invalid value, may cause an out-of-bounds access when the byte array representing the state of the TPM is accessed. This will likely crash swtpm or prevent it from starting since the state cannot be understood. Users should upgrade to swtpm v0.5.3, v0.6.2, or v0.7.1 to receive a patch. There are currently no known workarounds.

CVSS3: 6.2
EPSS: Низкий
debian логотип

CVE-2022-23645

больше 3 лет назад

swtpm is a libtpms-based TPM emulator with socket, character device, a ...

CVSS3: 6.2
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4457-1

больше 2 лет назад

Security update for libtpms

EPSS: Низкий
github логотип

GHSA-6527-9qhc-39j4

больше 3 лет назад

A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.

CVSS3: 8.2
EPSS: Низкий
fstec логотип

BDU:2021-03392

около 4 лет назад

Уязвимость библиотеки libtpms, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать аварийное завершение системы или вызвать отказ в обслуживании

CVSS3: 6.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1297-1

около 3 лет назад

Security update for swtpm

EPSS: Низкий
oracle-oval логотип

ELSA-2022-8100

больше 2 лет назад

ELSA-2022-8100: swtpm security and bug fix update (LOW)

EPSS: Низкий
fstec логотип

BDU:2022-06088

больше 3 лет назад

Уязвимость TPM эмулятора swtpm, связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.2
EPSS: Низкий
rocky логотип

RLSA-2022:7472

больше 2 лет назад

Low: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-7472

больше 2 лет назад

ELSA-2022-7472: virt:ol and virt-devel:ol security, bug fix, and enhancement update (LOW)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2022-9240

ELSA-2022-9240: libtpms security update (IMPORTANT)

около 3 лет назад
ubuntu логотип
CVE-2021-3623

A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.

CVSS3: 6.1
0%
Низкий
больше 3 лет назад
redhat логотип
CVE-2021-3623

A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.

CVSS3: 6.1
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-3623

A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.

CVSS3: 6.1
0%
Низкий
больше 3 лет назад
debian логотип
CVE-2021-3623

A flaw was found in libtpms. The flaw can be triggered by specially-cr ...

CVSS3: 6.1
0%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2022-23645

swtpm is a libtpms-based TPM emulator with socket, character device, and Linux CUSE interface. Versions prior to 0.5.3, 0.6.2, and 0.7.1 are vulnerable to out-of-bounds read. A specially crafted header of swtpm's state, where the blobheader's hdrsize indicator has an invalid value, may cause an out-of-bounds access when the byte array representing the state of the TPM is accessed. This will likely crash swtpm or prevent it from starting since the state cannot be understood. Users should upgrade to swtpm v0.5.3, v0.6.2, or v0.7.1 to receive a patch. There are currently no known workarounds.

CVSS3: 6.2
0%
Низкий
больше 3 лет назад
redhat логотип
CVE-2022-23645

swtpm is a libtpms-based TPM emulator with socket, character device, and Linux CUSE interface. Versions prior to 0.5.3, 0.6.2, and 0.7.1 are vulnerable to out-of-bounds read. A specially crafted header of swtpm's state, where the blobheader's hdrsize indicator has an invalid value, may cause an out-of-bounds access when the byte array representing the state of the TPM is accessed. This will likely crash swtpm or prevent it from starting since the state cannot be understood. Users should upgrade to swtpm v0.5.3, v0.6.2, or v0.7.1 to receive a patch. There are currently no known workarounds.

CVSS3: 5.5
0%
Низкий
больше 3 лет назад
nvd логотип
CVE-2022-23645

swtpm is a libtpms-based TPM emulator with socket, character device, and Linux CUSE interface. Versions prior to 0.5.3, 0.6.2, and 0.7.1 are vulnerable to out-of-bounds read. A specially crafted header of swtpm's state, where the blobheader's hdrsize indicator has an invalid value, may cause an out-of-bounds access when the byte array representing the state of the TPM is accessed. This will likely crash swtpm or prevent it from starting since the state cannot be understood. Users should upgrade to swtpm v0.5.3, v0.6.2, or v0.7.1 to receive a patch. There are currently no known workarounds.

CVSS3: 6.2
0%
Низкий
больше 3 лет назад
debian логотип
CVE-2022-23645

swtpm is a libtpms-based TPM emulator with socket, character device, a ...

CVSS3: 6.2
0%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:4457-1

Security update for libtpms

0%
Низкий
больше 2 лет назад
github логотип
GHSA-6527-9qhc-39j4

A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.

CVSS3: 8.2
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-03392

Уязвимость библиотеки libtpms, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать аварийное завершение системы или вызвать отказ в обслуживании

CVSS3: 6.1
0%
Низкий
около 4 лет назад
suse-cvrf логотип
SUSE-SU-2022:1297-1

Security update for swtpm

0%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2022-8100

ELSA-2022-8100: swtpm security and bug fix update (LOW)

больше 2 лет назад
fstec логотип
BDU:2022-06088

Уязвимость TPM эмулятора swtpm, связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.2
0%
Низкий
больше 3 лет назад
rocky логотип
RLSA-2022:7472

Low: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update

больше 2 лет назад
oracle-oval логотип
ELSA-2022-7472

ELSA-2022-7472: virt:ol and virt-devel:ol security, bug fix, and enhancement update (LOW)

больше 2 лет назад

Уязвимостей на страницу