Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-16837

Опубликовано: 16 нояб. 2017
Источник: ubuntu
Приоритет: medium
CVSS2: 4.6
CVSS3: 7.8

Описание

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.

РелизСтатусПримечание
artful

ignored

end of life
bionic

ignored

end of standard support, was needed
cosmic

released

1.9.7-0ubuntu1
devel

released

1.9.7-0ubuntu1
disco

released

1.9.7-0ubuntu1
eoan

released

1.9.7-0ubuntu1
esm-apps/bionic

needed

esm-apps/focal

released

1.9.7-0ubuntu1
esm-apps/jammy

released

1.9.7-0ubuntu1
esm-apps/noble

released

1.9.7-0ubuntu1

Показывать по

4.6 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 5.5
redhat
около 8 лет назад

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.

CVSS3: 7.8
nvd
около 8 лет назад

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.

CVSS3: 7.8
debian
около 8 лет назад

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are no ...

suse-cvrf
около 8 лет назад

Security update for tboot

suse-cvrf
около 8 лет назад

Recommended update for tboot

4.6 Medium

CVSS2

7.8 High

CVSS3