CVE-2024-29039

tpm2 is the source repository for the Trusted Platform Module (TPM2.0) tools. This vulnerability allows attackers to manipulate tpm2_checkquote outputs by altering the TPML_PCR_SELECTION in the PCR input file. As a result, digest values are incorrectly mapped to PCR slots and banks, providing a misleading picture of the TPM state. This issue has been patched in version 5.7.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tpm2-tools_project:tpm2-tools:*:*:*:*:*:*:*:*

History

04 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/[email protected]/message/EFR7SVEWCOXORHPCLLGXEMHFMIGG2MFE/ -
  • () https://lists.fedoraproject.org/archives/list/[email protected]/message/GI4JFEZBKQQUPJ4RWK6IHEWXAFCEJDPI/ -

Information

Published : 2024-06-28 16:15

Updated : 2025-11-04 18:16


NVD link : CVE-2024-29039

Mitre link : CVE-2024-29039

CVE.ORG link : CVE-2024-29039


JSON object : View

Products Affected

tpm2-tools_project

  • tpm2-tools
CWE
CWE-807

Reliance on Untrusted Inputs in a Security Decision