The keylime attestation verifier fails to flag a device's submitted TPM quote as faulty when the quote's signature does not validate for some reason. Instead, it will only emit an error in the log but not flag the device as being untrusted. To exploit this bug, a non-privileged user would have to modify the keylime agent to create invalid quotes a could then use invalid measurement lists to hide the trust state of a system. He would then have to trick the administrator in using the user's modified keylime agent. Upstream fix: https://github.com/keylime/keylime/commit/95ce3d86bd2c53009108ffda2dcf553312d733db
Created keylime tracking bugs for this issue: Affects: fedora-all [bug 2222908]
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:1139 https://access.redhat.com/errata/RHSA-2024:1139