tpm2 is the source repository for the Trusted Platform Module (TPM2.0) tools. This vulnerability allows attackers to manipulate tpm2_checkquote outputs by altering the TPML_PCR_SELECTION in the PCR input file. As a result, digest values are incorrectly mapped to PCR slots and banks, providing a misleading picture of the TPM state. This issue has been patched in version 5.7.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-06-28T15:48:25.623Z

Updated: 2024-08-02T01:03:51.670Z

Reserved: 2024-03-14T16:59:47.613Z

Link: CVE-2024-29039

cve-icon Vulnrichment

Updated: 2024-06-28T19:50:20.319Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-28T16:15:03.777

Modified: 2024-07-01T12:37:24.220

Link: CVE-2024-29039

cve-icon Redhat

Severity : Low

Publid Date: 2024-04-30T00:00:00Z

Links: CVE-2024-29039 - Bugzilla