Количество 7
Количество 7
CVE-2017-16837
Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.
CVE-2017-16837
Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.
CVE-2017-16837
Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.
CVE-2017-16837
Certain function pointers in Trusted Boot (tboot) through 1.9.6 are no ...
openSUSE-SU-2017:3100-1
Security update for tboot
SUSE-SU-2017:3090-1
Recommended update for tboot
GHSA-86m6-cj8w-2c48
Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2017-16837 Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers. | CVSS3: 7.8 | 0% Низкий | около 8 лет назад | |
CVE-2017-16837 Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers. | CVSS3: 5.5 | 0% Низкий | около 8 лет назад | |
CVE-2017-16837 Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers. | CVSS3: 7.8 | 0% Низкий | около 8 лет назад | |
CVE-2017-16837 Certain function pointers in Trusted Boot (tboot) through 1.9.6 are no ... | CVSS3: 7.8 | 0% Низкий | около 8 лет назад | |
openSUSE-SU-2017:3100-1 Security update for tboot | 0% Низкий | около 8 лет назад | ||
SUSE-SU-2017:3090-1 Recommended update for tboot | 0% Низкий | около 8 лет назад | ||
GHSA-86m6-cj8w-2c48 Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу