MGASA-2024-0170

Source
https://advisories.mageia.org/MGASA-2024-0170.html
Import Source
https://advisories.mageia.org/MGASA-2024-0170.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0170
Related
Published
2024-05-09T02:40:29Z
Modified
2024-05-09T01:35:11Z
Summary
Updated tpm2-tools packages fixes security vulnerabilities
Details

A flaw was found in the tpm2-tools package. This issue occurs due to a missing check whether the magic number in attest is equal to TPM2GENERATEDVALUE, which can allow an attacker to generate arbitrary quote data that may not be detected by tpm2checkquote (CVE-2024-29038). The pcr selection which is passed with the --pcr parameter is not compared with the attest. So it is possible to fake a valid attestation (CVE-2024-29039). A vulnerability classified as problematic was found in tpm2-tools. This vulnerability affects an unknown code of the file tools/misc/tpm2checkquote.c of the component pcr Selection Value Handler. The manipulation with an unknown input leads to a comparison vulnerability. The product compares two entities in a security-relevant context, but the comparison is incorrect, which may lead to resultant weaknesses.

References
Credits

Affected packages

Mageia:9 / tpm2-tools

Package

Name
tpm2-tools
Purl
pkg:rpm/mageia/tpm2-tools?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.5.1-1.mga9

Ecosystem specific

{
    "section": "core"
}