<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2024-0173</id>
    <title>An update for tpm2-tss is now available for HCE 2.0</title>
    <severity>Moderate</severity>
    <release>HCE 2.0</release>
    <issued date="2024-06-28 03:57:38"/>
    <updated date="2024-06-28 03:57:38"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-29040" id="CVE-2024-29040" title="CVE-2024-29040 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

 tpm2-tss is a software stack supporting Trusted Platform Module(TPM) 2.0 system APIs. It sits between TPM driver and applications, providing TPM2.0 specified APIs for applications to access TPM module through kernel TPM drivers. 

 tpm2-tools is a batch of tools for tpm2.0. It is based on tpm2-tss.  (CVE-2024-29040)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="tpm2-tss">
        <name>HCE 2.0</name>
        <package arch="aarch64" name="tpm2-tss" version="3.1.0" release="1.r6.hce2">
          <filename>tpm2-tss-3.1.0-1.r6.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="tpm2-tss-devel" version="3.1.0" release="1.r6.hce2">
          <filename>tpm2-tss-devel-3.1.0-1.r6.hce2.aarch64.rpm</filename>
        </package>
        <package arch="noarch" name="tpm2-tss-help" version="3.1.0" release="1.r6.hce2">
          <filename>tpm2-tss-help-3.1.0-1.r6.hce2.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="tpm2-tss" version="3.1.0" release="1.r6.hce2">
          <filename>tpm2-tss-3.1.0-1.r6.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="tpm2-tss-devel" version="3.1.0" release="1.r6.hce2">
          <filename>tpm2-tss-devel-3.1.0-1.r6.hce2.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
