A flaw was found in Keylime before 6.3.0. The logic in the Keylime agent for checking for a secure mount can be fooled by previously created unprivileged mounts allowing secrets to be leaked to other processes on the host.
References
Link | Resource |
---|---|
https://github.com/keylime/keylime/commit/1a4f31a6368d651222683c9debe7d6832db6f607 | Patch Third Party Advisory |
https://github.com/keylime/keylime/commit/d37c406e69cb6689baa2fb7964bad75209703724 | Patch Third Party Advisory |
https://github.com/keylime/keylime/security/advisories/GHSA-wj36-qcfg-5j52 | Third Party Advisory |
https://seclists.org/oss-sec/2022/q1/101 | Exploit Mailing List Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: fedora
Published: 2022-09-21T18:23:36
Updated: 2022-09-21T18:23:36
Reserved: 2022-01-25T00:00:00
Link: CVE-2022-23948
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-09-21T19:15:09.893
Modified: 2022-12-21T15:01:19.963
Link: CVE-2022-23948
JSON object: View
Redhat Information
No data.