logo
DATABASE RESOURCES PRICING ABOUT US

CVE-2017-16837

Description

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers. #### Bugs * <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803180>


Affected Package


OS OS Version Package Name Package Version
ubuntu 18.04 tboot any
ubuntu 18.10 tboot 1.9.7-0ubuntu1
ubuntu 19.04 tboot 1.9.7-0ubuntu1
ubuntu 19.10 tboot 1.9.7-0ubuntu1
ubuntu 20.04 tboot 1.9.7-0ubuntu1
ubuntu 20.10 tboot 1.9.7-0ubuntu1
ubuntu 21.04 tboot 1.9.7-0ubuntu1
ubuntu 21.10 tboot 1.9.7-0ubuntu1
ubuntu 22.04 tboot 1.9.7-0ubuntu1
ubuntu upstream tboot 1.9.7-0ubuntu1
ubuntu upstream tboot 1.9.7-0ubuntu1
ubuntu 14.04 tboot any
ubuntu upstream tboot 1.9.7-0ubuntu1
ubuntu 16.04 tboot any

Related