Known Vulnerabilities in tpm2-tools