Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-0934 | An improper input validation vulnerability in go-attestation before 0.3.3 allows local users to provide a maliciously-formed Quote over no/some PCRs, causing AKPublic.Verify to succeed despite the inconsistency. Subsequent use of the same set of PCR values in Eventlog.Verify lacks the authentication performed by quote verification, meaning a local attacker could couple this vulnerability with a maliciously-crafted TCG log in Eventlog.Verify to spoof events in the TCG log, hence defeating remotely-attested measured-boot. We recommend upgrading to Version 0.4.0 or above. |
Github GHSA |
GHSA-99cg-575x-774p | Go-Attestation Improper Input Validation with attacker-controlled TPM Quote |
Mon, 21 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-04-21T13:56:50.110Z
Reserved: 2022-01-20T00:00:00.000Z
Link: CVE-2022-0317
Updated: 2024-08-02T23:25:40.483Z
Status : Modified
Published: 2022-02-04T23:15:12.510
Modified: 2024-11-21T06:38:21.880
Link: CVE-2022-0317
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA