CVE-2024-29039

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-29039
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-29039.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-29039
Related
Published
2024-06-28T16:15:03Z
Modified
2025-01-08T09:42:56.492373Z
Downstream
Summary
[none]
Details

tpm2 is the source repository for the Trusted Platform Module (TPM2.0) tools. This vulnerability allows attackers to manipulate tpm2checkquote outputs by altering the TPMLPCR_SELECTION in the PCR input file. As a result, digest values are incorrectly mapped to PCR slots and banks, providing a misleading picture of the TPM state. This issue has been patched in version 5.7.

References

Affected packages

Debian:11 / tpm2-tools

Package

Name
tpm2-tools
Purl
pkg:deb/debian/tpm2-tools?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.0-2
5.2-1
5.3-1
5.4-1
5.6-1
5.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / tpm2-tools

Package

Name
tpm2-tools
Purl
pkg:deb/debian/tpm2-tools?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.4-1
5.6-1
5.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / tpm2-tools

Package

Name
tpm2-tools
Purl
pkg:deb/debian/tpm2-tools?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.7-1

Affected versions

5.*

5.4-1
5.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}