Input validation error in go-attestation - #VU132043
Published: May 21, 2026
go-attestation
Detailed vulnerability description
The vulnerability allows a remote attacker to compromise the integrity of the trusted measurement database.
The vulnerability exists due to improper input validation in parseEfiSignatureList() in attest/internal/events.go when parsing a crafted TPM event log containing an EFI_SIGNATURE_LIST with vendor header bytes. A remote attacker can supply a specially crafted TPM event log to compromise the integrity of the trusted measurement database.
For hashSHA256SigGUID lists, vendor header bytes are interpreted as signature entries, which can cause arbitrary SHA256 hashes to be added to the verifier's trusted hash list.