CVE-2021-3569

EUVD-2021-26879
A stack corruption bug was found in libtpms in versions before 0.7.2 and before 0.8.0 while decrypting data using RSA. This flaw could result in a SIGBUS (bad memory access) and termination of swtpm. The highest threat from this vulnerability is to system availability.
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 14%
Affected Products (NVD)
VendorProductVersion
libtpms_projectlibtpms
𝑥
< 0.7.2
libtpms_projectlibtpms
0.7.3 ≤
𝑥
< 0.8.0
redhatenterprise_linux
8.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libtpms
bookworm
0.9.2-3.1
fixed
bookworm (security)
0.9.2-3.1~deb12u1
fixed
sid
0.9.2-3.1
fixed
trixie
0.9.2-3.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libtpms
bionic
dne
focal
dne
groovy
ignored
hirsute
ignored
impish
not-affected
jammy
not-affected
trusty
dne
xenial
ignored