CVE-2023-3674: keylime fails to flag device as untrusted when signature does not validate
(updated )
A flaw was found in the keylime attestation verifier, which fails to flag a device’s submitted TPM quote as faulty when the quote’s signature does not validate for some reason. Instead, it will only emit an error in the log without flagging the device as untrusted.
References
- access.redhat.com/errata/RHSA-2024:1139
- access.redhat.com/security/cve/CVE-2023-3674
- bugzilla.redhat.com/show_bug.cgi?id=2222903
- github.com/advisories/GHSA-g4wg-cfpf-9689
- github.com/keylime/keylime
- github.com/keylime/keylime/commit/95ce3d86bd2c53009108ffda2dcf553312d733db
- github.com/pypa/advisory-database/tree/main/vulns/keylime/PYSEC-2023-128.yaml
- nvd.nist.gov/vuln/detail/CVE-2023-3674
Detect and mitigate CVE-2023-3674 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →