Bugzilla – Bug 1223689
VUL-0: CVE-2024-29039: tpm2.0-tools: pcr selection value is not compared with the attest
Last modified: 2024-05-27 18:25:14 UTC
The pcr selection which is passed with the --pcr parameter it not compared with the attest. So it's possible to fake a valid attestation. References: https://github.com/tpm2-software/tpm2-tools/commit/98599df9392a346216c5a059b8d35271286100bb References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-29039 https://bugzilla.redhat.com/show_bug.cgi?id=2278075
This is an autogenerated message for OBS integration: This bug (1223689) was mentioned in https://build.opensuse.org/request/show/1172162 Factory / tpm2.0-tools
SUSE-SU-2024:1636-1: An update that solves two vulnerabilities can now be installed. Category: security (moderate) Bug References: 1223687, 1223689 CVE References: CVE-2024-29038, CVE-2024-29039 Maintenance Incident: [SUSE:Maintenance:33669](https://smelt.suse.de/incident/33669/) Sources used: Basesystem Module 15-SP5 (src): tpm2.0-tools-5.2-150400.6.3.1 openSUSE Leap 15.4 (src): tpm2.0-tools-5.2-150400.6.3.1 openSUSE Leap Micro 5.3 (src): tpm2.0-tools-5.2-150400.6.3.1 openSUSE Leap Micro 5.4 (src): tpm2.0-tools-5.2-150400.6.3.1 openSUSE Leap 15.5 (src): tpm2.0-tools-5.2-150400.6.3.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): tpm2.0-tools-5.2-150400.6.3.1 SUSE Linux Enterprise Micro 5.3 (src): tpm2.0-tools-5.2-150400.6.3.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): tpm2.0-tools-5.2-150400.6.3.1 SUSE Linux Enterprise Micro 5.4 (src): tpm2.0-tools-5.2-150400.6.3.1 SUSE Linux Enterprise Micro 5.5 (src): tpm2.0-tools-5.2-150400.6.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.