Total
9 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-3500 | 3 Fedoraproject, Keylime, Redhat | 3 Fedora, Keylime, Enterprise Linux | 2023-02-01 | N/A | 5.1 MEDIUM |
A vulnerability was found in keylime. This security issue happens in some circumstances, due to some improperly handled exceptions, there exists the possibility that a rogue agent could create errors on the verifier that stopped attestation attempts for that host leaving it in an attested state but not verifying that anymore. | |||||
CVE-2021-3406 | 2 Fedoraproject, Keylime | 2 Fedora, Keylime | 2022-10-27 | 7.5 HIGH | 9.8 CRITICAL |
A flaw was found in keylime 5.8.1 and older. The issue in the Keylime agent and registrar code invalidates the cryptographic chain of trust from the Endorsement Key certificate to agent attestations. | |||||
CVE-2022-23948 | 1 Keylime | 1 Keylime | 2022-09-22 | N/A | 7.5 HIGH |
A flaw was found in Keylime before 6.3.0. The logic in the Keylime agent for checking for a secure mount can be fooled by previously created unprivileged mounts allowing secrets to be leaked to other processes on the host. | |||||
CVE-2022-23949 | 1 Keylime | 1 Keylime | 2022-09-22 | N/A | 7.5 HIGH |
In Keylime before 6.3.0, unsanitized UUIDs can be passed by a rogue agent and can lead to log spoofing on the verifier and registrar. | |||||
CVE-2022-23950 | 1 Keylime | 1 Keylime | 2022-09-22 | N/A | 7.5 HIGH |
In Keylime before 6.3.0, Revocation Notifier uses a fixed /tmp path for UNIX domain socket which can allow unprivileged users a method to prohibit keylime operations. | |||||
CVE-2022-23951 | 1 Keylime | 1 Keylime | 2022-09-22 | N/A | 5.5 MEDIUM |
In Keylime before 6.3.0, quote responses from the agent can contain possibly untrusted ZIP data which can lead to zip bombs. | |||||
CVE-2021-43310 | 1 Keylime | 1 Keylime | 2022-09-22 | N/A | 9.8 CRITICAL |
A vulnerability in Keylime before 6.3.0 allows an attacker to craft a request to the agent that resets the U and V keys as if the agent were being re-added to a verifier. This could lead to a remote code execution. | |||||
CVE-2022-23952 | 1 Keylime | 1 Keylime | 2022-09-22 | N/A | 7.5 HIGH |
In Keylime before 6.3.0, current keylime installer installs the keylime.conf file, which can contain sensitive data, as world-readable. | |||||
CVE-2022-1053 | 2 Fedoraproject, Keylime | 2 Fedora, Keylime | 2022-05-16 | 6.4 MEDIUM | 9.1 CRITICAL |
Keylime does not enforce that the agent registrar data is the same when the tenant uses it for validation of the EK and identity quote and the verifier for validating the integrity quote. This allows an attacker to use one AK, EK pair from a real TPM to pass EK validation and give the verifier an AK of a software TPM. A successful attack breaks the entire chain of trust because a not validated AK is used by the verifier. This issue is worse if the validation happens first and then the agent gets added to the verifier because the timing is easier and the verifier does not validate the regcount entry being equal to 1, |