Page 2 of 12 results (0.008 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

In Keylime before 6.3.0, quote responses from the agent can contain possibly untrusted ZIP data which can lead to zip bombs. En Keylime versiones anteriores a 6.3.0, las respuestas de cotización del agente pueden contener datos ZIP que no son confiables y que pueden conllevar a bombas zip • https://github.com/keylime/keylime/commit/6e44758b64b0ee13564fc46e807f4ba98091c355 https://github.com/keylime/keylime/security/advisories/GHSA-6xx7-m45w-76m2 https://seclists.org/oss-sec/2022/q1/101 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

In Keylime before 6.3.0, Revocation Notifier uses a fixed /tmp path for UNIX domain socket which can allow unprivileged users a method to prohibit keylime operations. En Keylime versiones anteriores a 6.3.0, el notificador de revocación usa una ruta /tmp fija para el socket de dominio UNIX que puede permitir a usuarios no privilegiado un método para prohibir las operaciones de Keylime • https://github.com/keylime/keylime/commit/ea5d0373fa2c050d5d95404eb779be7e8327b911 https://github.com/keylime/keylime/security/advisories/GHSA-9r9r-f8xc-m875 https://seclists.org/oss-sec/2022/q1/101 • CWE-379: Creation of Temporary File in Directory with Insecure Permissions CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

In Keylime before 6.3.0, unsanitized UUIDs can be passed by a rogue agent and can lead to log spoofing on the verifier and registrar. En Keylime versiones anteriores a 6.3.0, los UUIDs no saneados pueden ser pasados por un agente deshonesto y pueden conllevar a una suplantación de registros en el verificador y el registrador • https://github.com/keylime/keylime/commit/387e320dc22c89f4f47c68cb37eb9eec2137f34b https://github.com/keylime/keylime/commit/65c2b737129b5837f4a03660aeb1191ced275a57 https://github.com/keylime/keylime/commit/e429e95329fc60608713ddfb82f4a92ee3b3d2d9 https://github.com/keylime/keylime/security/advisories/GHSA-87gh-qc28-j9mm https://seclists.org/oss-sec/2022/q1/101 • CWE-290: Authentication Bypass by Spoofing •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability in Keylime before 6.3.0 allows an attacker to craft a request to the agent that resets the U and V keys as if the agent were being re-added to a verifier. This could lead to a remote code execution. Una vulnerabilidad en Keylime versiones anteriores a 6.3.0, permite a un atacante diseñar una petición al agente que restablezca las claves U y V como si el agente estuviera volviéndose a añadir a un verificador. Esto podría conllevar a una ejecución de código remota • https://github.com/keylime/keylime/security/advisories/GHSA-2m39-75g9-ff5r https://seclists.org/oss-sec/2022/q1/101 • CWE-290: Authentication Bypass by Spoofing •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A flaw was found in Keylime before 6.3.0. The logic in the Keylime agent for checking for a secure mount can be fooled by previously created unprivileged mounts allowing secrets to be leaked to other processes on the host. Se ha encontrado un fallo en Keylime versiones anteriores a 6.3.0. La lógica en el agente de Keylime para la comprobación de un montaje seguro puede ser engañada por montajes no privilegiados previamente creados, permitiendo que los secretos sean filtrados a otros procesos en el host • https://github.com/keylime/keylime/commit/1a4f31a6368d651222683c9debe7d6832db6f607 https://github.com/keylime/keylime/commit/d37c406e69cb6689baa2fb7964bad75209703724 https://github.com/keylime/keylime/security/advisories/GHSA-wj36-qcfg-5j52 https://seclists.org/oss-sec/2022/q1/101 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •