CVE-2023-3674
Summary
| CVE | CVE-2023-3674 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-07-19 19:15:00 UTC |
| Updated | 2023-11-07 04:19:00 UTC |
| Description | A flaw was found in the keylime attestation verifier, which fails to flag a device's submitted TPM quote as faulty when the quote's signature does not validate for some reason. Instead, it will only emit an error in the log without flagging the device as untrusted. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Fedoraproject | Fedora | 38 | All | All | All |
| Application | Keylime | Keylime | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| tpm_util: Replace a logger.error with an Exception in case of invalid… · keylime/keylime@95ce3d8 · GitHub | MISC | github.com | |
| 2222903 – (CVE-2023-3674) CVE-2023-3674 keylime: Attestation failure when the quote's signature does not validate | MISC | bugzilla.redhat.com | |
| cve-details | MISC | access.redhat.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.