6.2
CVE-2022-23645
- EPSS 0.02%
- Veröffentlicht 18.02.2022 21:15:13
- Zuletzt bearbeitet 21.11.2024 06:49:00
- Quelle security-advisories@github.com
- Teams Watchlist Login
- Unerledigt Login
swtpm is a libtpms-based TPM emulator with socket, character device, and Linux CUSE interface. Versions prior to 0.5.3, 0.6.2, and 0.7.1 are vulnerable to out-of-bounds read. A specially crafted header of swtpm's state, where the blobheader's hdrsize indicator has an invalid value, may cause an out-of-bounds access when the byte array representing the state of the TPM is accessed. This will likely crash swtpm or prevent it from starting since the state cannot be understood. Users should upgrade to swtpm v0.5.3, v0.6.2, or v0.7.1 to receive a patch. There are currently no known workarounds.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Swtpm Project ≫ Swtpm Version < 0.5.3
Swtpm Project ≫ Swtpm Version >= 0.6.0 < 0.6.2
Swtpm Project ≫ Swtpm Version0.7.0 Update-
Swtpm Project ≫ Swtpm Version0.7.0 Updaterc1
Swtpm Project ≫ Swtpm Version0.7.0 Updaterc2
Redhat ≫ Enterprise Linux Version8.0
Fedoraproject ≫ Fedora Version35
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.042 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 2.1 | 3.9 | 2.9 |
AV:L/AC:L/Au:N/C:N/I:N/A:P
|
security-advisories@github.com | 6.2 | 2.5 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-125 Out-of-bounds Read
The product reads data past the end, or before the beginning, of the intended buffer.