An improper input validation vulnerability in go-attestation before 0.3.3 allows local users to provide a maliciously-formed Quote over no/some PCRs, causing AKPublic.Verify to succeed despite the inconsistency. Subsequent use of the same set of PCR values in Eventlog.Verify lacks the authentication performed by quote verification, meaning a local attacker could couple this vulnerability with a maliciously-crafted TCG log in Eventlog.Verify to spoof events in the TCG log, hence defeating remotely-attested measured-boot. We recommend upgrading to Version 0.4.0 or above.
Metrics
Affected Vendors & Products
References
History
Mon, 21 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Google
Published: 2022-02-04T22:33:03.136Z
Updated: 2025-04-21T13:56:50.110Z
Reserved: 2022-01-20T00:00:00.000Z
Link: CVE-2022-0317

Updated: 2024-08-02T23:25:40.483Z

Status : Modified
Published: 2022-02-04T23:15:12.510
Modified: 2024-11-21T06:38:21.880
Link: CVE-2022-0317

No data.