Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-23645
HistoryFeb 18, 2022 - 12:00 a.m.

CVE-2022-23645

2022-02-1800:00:00
ubuntu.com
ubuntu.com
19

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

0.0004 Low

EPSS

Percentile

13.3%

swtpm is a libtpms-based TPM emulator with socket, character device, and
Linux CUSE interface. Versions prior to 0.5.3, 0.6.2, and 0.7.1 are
vulnerable to out-of-bounds read. A specially crafted header of swtpm’s
state, where the blobheader’s hdrsize indicator has an invalid value, may
cause an out-of-bounds access when the byte array representing the state of
the TPM is accessed. This will likely crash swtpm or prevent it from
starting since the state cannot be understood. Users should upgrade to
swtpm v0.5.3, v0.6.2, or v0.7.1 to receive a patch. There are currently no
known workarounds.

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

0.0004 Low

EPSS

Percentile

13.3%