tpm2 is the source repository for the Trusted Platform Module (TPM2.0) tools. This vulnerability allows attackers to manipulate tpm2_checkquote outputs by altering the TPML_PCR_SELECTION in the PCR input file. As a result, digest values are incorrectly mapped to PCR slots and banks, providing a misleading picture of the TPM state. This issue has been patched in version 5.7.
References
Configurations
No configuration.
History
21 Nov 2024, 09:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/tpm2-software/tpm2-tools/releases/tag/5.7 - | |
References | () https://github.com/tpm2-software/tpm2-tools/security/advisories/GHSA-8rjm-5f5f-h4q6 - |
01 Jul 2024, 12:37
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
28 Jun 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-28 16:15
Updated : 2024-11-21 09:07
NVD link : CVE-2024-29039
Mitre link : CVE-2024-29039
CVE.ORG link : CVE-2024-29039
JSON object : View
Products Affected
No product.
CWE
CWE-807
Reliance on Untrusted Inputs in a Security Decision