6.2
CVE-2022-23645
- EPSS 0.02%
- Published 18.02.2022 21:15:13
- Last modified 21.11.2024 06:49:00
- Source security-advisories@github.com
- Teams watchlist Login
- Open Login
swtpm is a libtpms-based TPM emulator with socket, character device, and Linux CUSE interface. Versions prior to 0.5.3, 0.6.2, and 0.7.1 are vulnerable to out-of-bounds read. A specially crafted header of swtpm's state, where the blobheader's hdrsize indicator has an invalid value, may cause an out-of-bounds access when the byte array representing the state of the TPM is accessed. This will likely crash swtpm or prevent it from starting since the state cannot be understood. Users should upgrade to swtpm v0.5.3, v0.6.2, or v0.7.1 to receive a patch. There are currently no known workarounds.
Data is provided by the National Vulnerability Database (NVD)
Swtpm Project ≫ Swtpm Version < 0.5.3
Swtpm Project ≫ Swtpm Version >= 0.6.0 < 0.6.2
Swtpm Project ≫ Swtpm Version0.7.0 Update-
Swtpm Project ≫ Swtpm Version0.7.0 Updaterc1
Swtpm Project ≫ Swtpm Version0.7.0 Updaterc2
Redhat ≫ Enterprise Linux Version8.0
Fedoraproject ≫ Fedora Version35
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.042 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 2.1 | 3.9 | 2.9 |
AV:L/AC:L/Au:N/C:N/I:N/A:P
|
security-advisories@github.com | 6.2 | 2.5 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-125 Out-of-bounds Read
The product reads data past the end, or before the beginning, of the intended buffer.