File _patchinfo of Package patchinfo.5726

<patchinfo incident="5726">
  <issue id="1057555" tracker="bnc">tboot wait-for-sipi loop timed-out issue on Purley 8s server</issue>
  <issue id="1068390" tracker="bnc">VUL-0: CVE-2017-16837: tboot: Certain function pointers in Trusted Boot (tboot) through 1.9.6 are notvalidated and can cause arbitrary code execution, which allows local users tooverwrite dynamic PCRs of Trusted Platform Module (TPM) by h</issue>
  <issue id="2017-16837" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>mgerstner</packager>
  <description>This update for tboot fixes the following issues:

Security issue fixed:

- CVE-2017-16837: Certain function pointers in Trusted Boot (tboot) through 1.9.6 are
  notvalidated and can cause arbitrary code execution, which allows local users
  tooverwrite dynamic PCRs of Trusted Platform Module (TPM) by h (bsc#1068390)

Bug fixes:

- Fixed failed trusted boot on some systems like Intel Xeon "Purley 8s" processors. The
  following error message showed: "TBOOT: wait-for-sipi loop timed-out". Booting continued
  but "TXT measured launch" was wrongly reported as FALSE. (bsc#1057555)
</description>
  <summary>Recommended update for tboot</summary>
</patchinfo>
openSUSE Build Service is sponsored by