A vulnerability was found in keylime. This security issue happens in some circumstances, due to some improperly handled exceptions, there exists the possibility that a rogue agent could create errors on the verifier that stopped attestation attempts for that host leaving it in an attested state but not verifying that anymore.
References
Link | Resource |
---|---|
https://github.com/keylime/keylime/pull/1128 | Issue Tracking Patch Third Party Advisory |
https://access.redhat.com/security/cve/CVE-2022-3500 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQH5CJRX65QYMQN5WGUKKKE3IRJBWG5Z/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PUTHMDVFNGGVPCNPOGULMJAAFEP7MEXP/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QX4XVCAUFGJ2I2NCTOKONTJGRJB2NBBT/ | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2022-11-22 11:15
Updated : 2023-02-01 08:00
NVD link : CVE-2022-3500
Mitre link : CVE-2022-3500
JSON object : View
CWE
CWE-248
Uncaught Exception
Products Affected
fedoraproject
- fedora
redhat
- enterprise_linux
keylime
- keylime