{"id":"CVE-2021-3623","details":"A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.","modified":"2026-05-18T05:55:15.537694689Z","published":"2022-03-02T23:15:08.623Z","related":["SUSE-SU-2022:4457-1","openSUSE-SU-2024:12445-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","extracted_events":[{"last_affected":"34"}],"cpes":["cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"],"vendor_product":"fedoraproject:fedora"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*"],"vendor_product":"redhat:enterprise_linux"}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7KZSYMTE7Z4BBEZUWO2DIMQDWMGEP46/"},{"type":"REPORT","url":"https://github.com/stefanberger/libtpms/pull/223"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1976806"},{"type":"FIX","url":"https://github.com/stefanberger/libtpms/commit/2e6173c"},{"type":"FIX","url":"https://github.com/stefanberger/libtpms/commit/2f30d62"},{"type":"FIX","url":"https://github.com/stefanberger/libtpms/commit/7981d9a"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/stefanberger/libtpms","events":[{"introduced":"0"},{"fixed":"bc59931b2b4c6abb7678e7f1a44be9d1dd0fc06d"},{"introduced":"d061d8065b74a16d918a007e844b1ab66f4bdb8b"},{"fixed":"4893c23e3bb02560588150d3f11575c2916eb759"},{"introduced":"3fd4b94903061e156e64dc6a738237df2aebba09"},{"fixed":"a594c4692a9623469cc8c3556b7c3ae6bae42948"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"fixed":"0.6.5"},{"introduced":"0.7.0"},{"fixed":"0.7.8"},{"introduced":"0.8.0"},{"fixed":"0.8.4"}],"cpe":"cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*"}}],"versions":["v0.6.4","v0.8.3","v0.7.7","v0.8.2","v0.8.1","v0.7.6","v0.6.3","v0.8.0","v0.7.5","v0.7.4","v0.7.3","v0.6.2","v0.7.2","v0.7.1","v0.6.1","v0.7.0","v0.6.0","v0.5.2.1","v0.5.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-3623.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}]}