writeups.xyz
/
Libtpms
Title
Vulnerabilities
Programs
Authors
Vulnerabilities in the TPM 2.0 reference implementation code
Memory Corruption
Out-of-Bounds Read
Out-of-Bounds Write
Microsoft
VMware
Google
IBM
Lenovo
Qemu
Nuvoton
Trusted Computing Group
STMicroelectronics
Aruba Networks
CERT/CC
Libtpms
Francisco Falcon (@Fdfalcon)
Page 1 of 1