CVE-2024-29039

tpm2 is the source repository for the Trusted Platform Module (TPM2.0) tools. This vulnerability allows attackers to manipulate tpm2_checkquote outputs by altering the TPML_PCR_SELECTION in the PCR input file. As a result, digest values are incorrectly mapped to PCR slots and banks, providing a misleading picture of the TPM state. This issue has been patched in version 5.7.
Configurations

No configuration.

History

21 Nov 2024, 09:07

Type Values Removed Values Added
References () https://github.com/tpm2-software/tpm2-tools/releases/tag/5.7 - () https://github.com/tpm2-software/tpm2-tools/releases/tag/5.7 -
References () https://github.com/tpm2-software/tpm2-tools/security/advisories/GHSA-8rjm-5f5f-h4q6 - () https://github.com/tpm2-software/tpm2-tools/security/advisories/GHSA-8rjm-5f5f-h4q6 -

01 Jul 2024, 12:37

Type Values Removed Values Added
Summary
  • (es) tpm2 es el repositorio de origen de las herramientas del Módulo de plataforma segura (TPM2.0). Esta vulnerabilidad permite a los atacantes manipular las salidas de tpm2_checkquote alterando TPML_PCR_SELECTION en el archivo de entrada de PCR. Como resultado, los valores de resumen se asignan incorrectamente a las ranuras y bancos de PCR, lo que proporciona una imagen engañosa del estado del TPM. Este problema se solucionó en la versión 5.7.

28 Jun 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-28 16:15

Updated : 2024-11-21 09:07


NVD link : CVE-2024-29039

Mitre link : CVE-2024-29039

CVE.ORG link : CVE-2024-29039


JSON object : View

Products Affected

No product.

CWE
CWE-807

Reliance on Untrusted Inputs in a Security Decision