{"affected":[{"ecosystem_specific":{"binaries":[{"libefivar1":"38-3.1","libtss2-esys0":"4.1.0-1.1","libtss2-fapi-common":"4.1.0-1.1","libtss2-fapi1":"4.1.0-1.1","libtss2-mu0":"4.1.0-1.1","libtss2-rc0":"4.1.0-1.1","libtss2-sys1":"4.1.0-1.1","libtss2-tcti-device0":"4.1.0-1.1","libtss2-tcti-spi-helper0":"4.1.0-1.1","libtss2-tcti-spidev0":"4.1.0-1.1","libtss2-tctildr0":"4.1.0-1.1","tpm2-0-tss":"4.1.0-1.1","tpm2.0-tools":"5.7-1.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"efivar","purl":"pkg:rpm/suse/efivar&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"38-3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libefivar1":"38-3.1","libtss2-esys0":"4.1.0-1.1","libtss2-fapi-common":"4.1.0-1.1","libtss2-fapi1":"4.1.0-1.1","libtss2-mu0":"4.1.0-1.1","libtss2-rc0":"4.1.0-1.1","libtss2-sys1":"4.1.0-1.1","libtss2-tcti-device0":"4.1.0-1.1","libtss2-tcti-spi-helper0":"4.1.0-1.1","libtss2-tcti-spidev0":"4.1.0-1.1","libtss2-tctildr0":"4.1.0-1.1","tpm2-0-tss":"4.1.0-1.1","tpm2.0-tools":"5.7-1.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"tpm2-0-tss","purl":"pkg:rpm/suse/tpm2-0-tss&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.1.0-1.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libefivar1":"38-3.1","libtss2-esys0":"4.1.0-1.1","libtss2-fapi-common":"4.1.0-1.1","libtss2-fapi1":"4.1.0-1.1","libtss2-mu0":"4.1.0-1.1","libtss2-rc0":"4.1.0-1.1","libtss2-sys1":"4.1.0-1.1","libtss2-tcti-device0":"4.1.0-1.1","libtss2-tcti-spi-helper0":"4.1.0-1.1","libtss2-tcti-spidev0":"4.1.0-1.1","libtss2-tctildr0":"4.1.0-1.1","tpm2-0-tss":"4.1.0-1.1","tpm2.0-tools":"5.7-1.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"tpm2.0-tools","purl":"pkg:rpm/suse/tpm2.0-tools&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.7-1.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for tpm2.0-tools, tpm2-0-tss fixes the following issues:\n\ntpm2-0-tss:\n  Update to version 4.1:\n  + Security\n    - CVE-2024-29040: arbitrary quote data may go undetected by Fapi_VerifyQuote (bsc#1223690)\n\n  + Fixed\n    - fapi: Fix length check on FAPI auth callbacks\n    - mu: Correct error message for errors\n    - tss2-rc: fix unknown laer handler dropping bits.\n    - fapi: Fix deviation from CEL specification (template_value was used instead of template_data).\n    - fapi: Fix json syntax error in FAPI profiles which was ignored by json-c.\n    - build: fix build fail after make clean.\n    - mu: Fix unneeded size check in TPM2B unmarshaling.\n    - fapi: Fix missing parameter encryption.\n    - build: Fix failed build with --disable-vendor.\n    - fapi: Fix flush of persistent handles.\n    - fapi: Fix test provisioning with template with self generated certificate disabled.\n    - fapi: Fix error in Fapi_GetInfo it TPM supports SHA3 hash algs.\n    - fapi: Revert pcr extension for EV_NO_ACTION events.\n    - fapi: Fix strange error messages if nv, ext, or policy path does not exits.\n    - fapi: Fix segfault caused by wrong allocation of pcr policy.\n    - esys: Fix leak in Esys_EvictControl for persistent handles.\n    - tss2-tcti: tcti-libtpms: fix test failure on big-endian platform.\n    - esys: Add reference counting for Esys_TR_FromTPMPublic.\n    - esys: Fix HMAC error if session bind key has an auth value with a trailing 0.\n    - fapi: fix usage of self signed certificates in TPM.\n    - fapi: Usage of self signed certificates.\n    - fapi: A segfault after the error handling of non existing keys.\n    - fapi: Fix several leaks.\n    - fapi: Fix error handling for policy execution.\n    - fapi: Fix usage of persistent handles (should not be flushed)\n    - fapi: Fix test provisioning with template (skip test without self generated certificate).\n    - fapi: Fix pcr extension for EV_NO_ACTION\n    - test: Fix fapi-key-create-policy-signed-keyedhash with P_ECC384 profile\n    - tcti_spi_helper_transmit: ensure FIFO is accessed only after TPM reports commandReady bit is set\n    - fapi: Fix read large system eventlog (> UINT16_MAX).\n    - esys tests: Fix layer check for TPM2_RC_COMMAND_CODE (for /dev/tpmrm0)\n    - test: unit: tcti-libtpms: fix test failed at 32-bit platforms.\n    - fapi: Fix possible null pointer dereferencing in Fapi_List.\n    - sys: Fix size check in Tss2_Sys_GetCapability.\n    - esys: Fix leak in Esys_TR_FromTPMPublic.\n    - esys: fix unchecked return value in esys crypto.\n    - fapi: Fix wrong usage of local variable in provisioning.\n    - fapi: Fix memset 0 in ifapi_json_TPMS_POLICYNV_deserialize.\n    - fapi: Fix possible out of bound array access in IMA parser.\n    - tcti device: Fix possible unmarshalling from uninitialized variable.\n    - fapi: Fix error checking authorization of signing key.\n    - fapi: Fix cleanup of policy sessions.\n    - fapi: Eventlog H-CRTM events and different localities.\n    - fapi: Fix missing synchronization of quote and eventlog.\n    - faii: Fix invalid free in Fapi_Quote with empty eventlog.\n\n  + Added\n    - tcti: LetsTrust-TPM2Go TCTI module spi-ltt2go.\n    - mbedtls: add sha512 hmac.\n    - fapi: Enable usage of external keys for Fapi_Encrypt.\n    - fapi: Support download of AMD certificates.\n    - tcti: Add USB TPM (FTDI MPSSE USB to SPI bridge) TCTI module.\n    - fapi: The recreation of primaries (except EK) in the owner hierarchy instead the endorsement hierarchy is fixed.\n    - rc: New TPM return codes added.\n    - fapi: Further Nuvoton certificates added.\n    - tpm_types/esys: Add support for Attestable TPM changes in latest TPM spec.\n    - tcti: Add '/dev/tcm0' to default conf\n    - fapi: New Nuvoton certificates added.\n    - esys: Fix leak in Esys_TR_FromTPMPublic.\n\n  + Removed\n    - Testing on Ubuntu 18.04 as it's near EOL (May 2023).\n\n\ntpm2.0-tools:\n  Update to version 5.7:\n  + Security\n    - CVE-2024-29038: arbitrary quote data may go undetected by tpm2_checkquote (bsc#1223687)\n    - CVE-2024-29039: pcr selection value is not compared with the attest (bsc#1223689)\n  + Fixed\n    - Fix eventlog test\n    - Fix issues with reading NV indexes\n    - Fix context save error on tpm2_create\n    - tpm2_sessionconfig: fix handling of --disable-continue session so that the subsequent command will not fail\n    - when attempting to context save a flushed session.\n    - detection of functions within libcrypto when CRYPTO_LIBS is set and system has install libcrypto.\n    - tpm2_send: fix EOF detection on input stream.\n    - tpm2_policy.c fix compilation error caused by format directive for size_t on 32 bit systems.\n    - tpm2_nvread: fix input handling no nv index.\n    - Auth file: Ensure 0-termination when reading auths from a file.\n    - configure.ac: fix bashisms. configure scripts need to be runnable with a POSIX-compliant /bin/sh.\n    - cirrus.yml fix tss compilation with libtpms for FreeBSD.\n    - tpm2_tool.c Fix missing include for basename to enable compilation on netbsd.\n    - options: fix TCTI handling to avoid failures for commands that should work with no options.\n    - tpm2_getekcertificate.c Fix leak. ek_uri was not freed if get_ek_server_address failed.\n  + Added\n    - Add the possibility for autoflush (environment variable \"TPM2TOOLS_AUTOFLUSH\", or -R option)\n  + Removed\n    - Testing on Ubuntu 18.04 as it's near EOL (May 2023).m2_policy.c fix compilation error caused by format directive for size_t on 32 bit systems.\n    - tpm2_nvread: fix input handling no nv index.\n\n  - Update to version 5.6\n    + tpm2_eventlog:\n      * add H-CRTM event support\n      * add support of efivar versions less than 38\n      * Add support to check for efivar/efivar.h manually\n      * Minor formatting fixes\n      * tpm2_eventlog: add support for replay with different StartupLocality\n      * Fix pcr extension for EV_NO_ACTION\n      * Extend test of yaml string representation\n      * Use helper for printing a string dump\n      * Fix upper bound on unique data size\n      * Fix YAML string formatting\n    + tpm2_policy:\n      * Add support for parsing forward seal TPM values\n      * Use forward seal values in creating policies\n      * Move dgst_size in evaluate_populate_pcr_digests()\n      * Allow more than 8 PCRs for sealing\n      * Move dgst_size in evaluate_populate_pcr_digests\n      * Allow more than 8 PCRs for sealing\n      * Make __wrap_Esys_PCR_Read() more dynamic to enable testing more PCRs\n    + tpm2_encryptdecrypt: Fix pkcs7 padding stripping\n    + tpm2_duplicate:\n      * Support -a option for attributes\n      * Add --key-algorithm option\n    + tpm2_encodeobject: Use the correct -O option instead of -C\n    + tpm2_unseal: Add qualifier static to enhance the privacy of unseal\n      function\n    + tpm2_sign:\n      * Remove -m option which was added mistakenly\n      * Revert sm2 sign and verifysignature\n    + tpm2_createek:\n      * Correct man page example\n      * Fix usage of nonce\n      * Fix integrating nonce\n    + tpm2_clear: add more details about the action\n    + tpm2_startauthsession: allow the file attribute for policy\n      authorization.\n    + tpm2_getekcertificate: Add AMD EK support\n    + tpm2_ecdhzgen: Add public-key parameter\n    + tpm2_nvreadpublic: Prevent free of unallocated pointers on failure\n    + Bug-fixes:\n      * The readthedocs build failed with module 'jinja2' has no\n        attribute 'contextfilter' a requirement file was added to fix\n        this problem\n      * An error caused by the flags -flto -_FORTIFY_SOURCE=3 in kdfa\n        implementation. This error can be avoided by switching off the\n        optimization with pragma\n      * Changed wrong function name of \"Esys_Load\" to \"Esys_Load\"\n      * Function names beginning with Esys_ are wrongly written as Eys_\n      * Reading and writing a serialized persistent ESYS_TR handles\n      * cirrus-ci update image-family to freebsd-13-2 from 13-1\n    + misc:\n      * Change the default Python version to Python3 in the helper's code\n      * Skip test which uses the sign operator for comparison in\n        abrmd_policynv.sh\n      * tools/tr_encode: Add a tool that can encode serialized ESYS_TR\n        for persistent handles from the TPM2B_PUBLIC and the raw\n        persistent TPM2_HANDLE\n      * Add safe directory in config\n","id":"SUSE-SU-2025:20151-1","modified":"2025-03-18T10:58:34Z","published":"2025-03-18T10:58:34Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520151-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223687"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223689"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223690"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-29038"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-29039"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-29040"}],"related":["CVE-2024-29038","CVE-2024-29039","CVE-2024-29040"],"summary":"Security update for tpm2.0-tools, tpm2-0-tss","upstream":["CVE-2024-29038","CVE-2024-29039","CVE-2024-29040"]}