Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2024-29040

Publication date 30 April 2024

Last updated 24 July 2024


Ubuntu priority

This repository hosts source code implementing the Trusted Computing Group's (TCG) TPM2 Software Stack (TSS). The JSON Quote Info returned by Fapi_Quote has to be deserialized by Fapi_VerifyQuote to the TPM Structure `TPMS_ATTEST`. For the field `TPM2_GENERATED magic` of this structure any number can be used in the JSON structure. The verifier can receive a state which does not represent the actual, possibly malicious state of the device under test. The malicious device might get access to data it shouldn't, or can use services it shouldn't be able to. This issue has been patched in version 4.1.0.

Status

Package Ubuntu Release Status
tpm2-tss 24.10 oracular
Fixed 4.1.0-1ubuntu1
24.04 LTS noble
Fixed 4.0.1-7.1ubuntu5.1
23.10 mantic
Fixed 4.0.1-3ubuntu1.1
22.04 LTS jammy
Fixed 3.2.0-1ubuntu1.1
20.04 LTS focal
Not affected
18.04 LTS bionic
Not affected
16.04 LTS xenial
Not affected

References

Related Ubuntu Security Notices (USN)

    • USN-6796-1
    • TPM2 Software Stack vulnerabilities
    • 29 May 2024

Other references