Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. keylime
  4. ›
  5. CVE-2022-1053

CVE-2022-1053: Tenant and Verifier might not use the same registrar data

May 5, 2022 (updated March 30, 2026)

Keylime does not enforce that the agent registrar data is the same when the tenant uses it for validation of the EK and identity quote and the verifier for validating the integrity quote. This allows an attacker to use one AK, EK pair from a real TPM to pass EK validation and give the verifier an AK of a software TPM. A successful attack breaks the entire chain of trust because a not validated AK is used by the verifier. This issue is worse if the validation happens first and then the agent gets added to the verifier because the timing is easier and the verifier does not validate the regcount entry being equal to 1. At this time, there are no known workaround.

References

  • bugzilla.redhat.com/show_bug.cgi?id=2065024
  • github.com/advisories/GHSA-jf66-3q76-h5p5
  • github.com/keylime/keylime
  • github.com/keylime/keylime/commit/bd5de712acdd77860e7dc58969181e16c7a8dc5d
  • github.com/keylime/keylime/security/advisories/GHSA-jf66-3q76-h5p5
  • github.com/pypa/advisory-database/tree/main/vulns/keylime/PYSEC-2022-184.yaml
  • lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A7WAKVXM7L5D2DUACV6EHA6EJNAX2GVL
  • lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RF6QHU4UGSBATC3HOOE7OP66CYVTR7CV
  • lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEW2PAXO5YGLDLPG45YV2OPLJXJSCECQ
  • nvd.nist.gov/vuln/detail/CVE-2022-1053

Code Behaviors & Features

Detect and mitigate CVE-2022-1053 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 6.4.0

Fixed versions

  • 6.4.0

Solution

Upgrade to version 6.4.0 or above.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-20: Improper Input Validation

Source file

pypi/keylime/CVE-2022-1053.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:56 +0000.