Vulnerability Description
A stack corruption bug was found in libtpms in versions before 0.7.2 and before 0.8.0 while decrypting data using RSA. This flaw could result in a SIGBUS (bad memory access) and termination of swtpm. The highest threat from this vulnerability is to system availability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libtpms Project | Libtpms | < 0.7.2 |
| Redhat | Enterprise Linux | 8.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1964358Issue TrackingPatchThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1964358Issue TrackingPatchThird Party Advisory
FAQ
What is CVE-2021-3569?
CVE-2021-3569 is a vulnerability with a CVSS score of 5.5 (MEDIUM). A stack corruption bug was found in libtpms in versions before 0.7.2 and before 0.8.0 while decrypting data using RSA. This flaw could result in a SIGBUS (bad memory access) and termination of swtpm. ...
How severe is CVE-2021-3569?
CVE-2021-3569 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-3569?
Check the references section above for vendor advisories and patch information. Affected products include: Libtpms Project Libtpms, Redhat Enterprise Linux.