CVE-2021-3569

A stack corruption bug was found in libtpms in versions before 0.7.2 and before 0.8.0 while decrypting data using RSA. This flaw could result in a SIGBUS (bad memory access) and termination of swtpm. The highest threat from this vulnerability is to system availability.
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 33%
VendorProductVersion
libtpms_projectlibtpms
𝑥
< 0.7.2
libtpms_projectlibtpms
0.7.3 ≤
𝑥
< 0.8.0
redhatenterprise_linux
8.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libtpms
bookworm (security)
0.9.2-3.1~deb12u1
fixed
sid
0.9.2-3.1
fixed
trixie
0.9.2-3.1
fixed
bookworm
0.9.2-3.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libtpms
jammy
not-affected
impish
not-affected
hirsute
ignored
groovy
ignored
focal
dne
bionic
dne
xenial
ignored
trusty
dne