Количество 8
Количество 8

CVE-2024-29039
tpm2 is the source repository for the Trusted Platform Module (TPM2.0) tools. This vulnerability allows attackers to manipulate tpm2_checkquote outputs by altering the TPML_PCR_SELECTION in the PCR input file. As a result, digest values are incorrectly mapped to PCR slots and banks, providing a misleading picture of the TPM state. This issue has been patched in version 5.7.

CVE-2024-29039
tpm2 is the source repository for the Trusted Platform Module (TPM2.0) tools. This vulnerability allows attackers to manipulate tpm2_checkquote outputs by altering the TPML_PCR_SELECTION in the PCR input file. As a result, digest values are incorrectly mapped to PCR slots and banks, providing a misleading picture of the TPM state. This issue has been patched in version 5.7.

CVE-2024-29039
tpm2 is the source repository for the Trusted Platform Module (TPM2.0) tools. This vulnerability allows attackers to manipulate tpm2_checkquote outputs by altering the TPML_PCR_SELECTION in the PCR input file. As a result, digest values are incorrectly mapped to PCR slots and banks, providing a misleading picture of the TPM state. This issue has been patched in version 5.7.

CVE-2024-29039
CVE-2024-29039
tpm2 is the source repository for the Trusted Platform Module (TPM2.0) ...

ROS-20240708-02
Уязвимость tpm2-tools

SUSE-SU-2024:1636-1
Security update for tpm2.0-tools
ELSA-2024-9424
ELSA-2024-9424: tpm2-tools security update (LOW)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-29039 tpm2 is the source repository for the Trusted Platform Module (TPM2.0) tools. This vulnerability allows attackers to manipulate tpm2_checkquote outputs by altering the TPML_PCR_SELECTION in the PCR input file. As a result, digest values are incorrectly mapped to PCR slots and banks, providing a misleading picture of the TPM state. This issue has been patched in version 5.7. | CVSS3: 9 | 0% Низкий | 12 месяцев назад |
![]() | CVE-2024-29039 tpm2 is the source repository for the Trusted Platform Module (TPM2.0) tools. This vulnerability allows attackers to manipulate tpm2_checkquote outputs by altering the TPML_PCR_SELECTION in the PCR input file. As a result, digest values are incorrectly mapped to PCR slots and banks, providing a misleading picture of the TPM state. This issue has been patched in version 5.7. | CVSS3: 3.3 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-29039 tpm2 is the source repository for the Trusted Platform Module (TPM2.0) tools. This vulnerability allows attackers to manipulate tpm2_checkquote outputs by altering the TPML_PCR_SELECTION in the PCR input file. As a result, digest values are incorrectly mapped to PCR slots and banks, providing a misleading picture of the TPM state. This issue has been patched in version 5.7. | CVSS3: 9 | 0% Низкий | 12 месяцев назад |
![]() | CVSS3: 9 | 0% Низкий | 11 месяцев назад | |
CVE-2024-29039 tpm2 is the source repository for the Trusted Platform Module (TPM2.0) ... | CVSS3: 9 | 0% Низкий | 12 месяцев назад | |
![]() | ROS-20240708-02 Уязвимость tpm2-tools | CVSS2: 7.6 | 0% Низкий | 12 месяцев назад |
![]() | SUSE-SU-2024:1636-1 Security update for tpm2.0-tools | около 1 года назад | ||
ELSA-2024-9424 ELSA-2024-9424: tpm2-tools security update (LOW) | 8 месяцев назад |
Уязвимостей на страницу