File tree Expand file tree Collapse file tree 1 file changed +36
-0
lines changed
advisories/hackage/crypton Expand file tree Collapse file tree 1 file changed +36
-0
lines changed Original file line number Diff line number Diff line change 1+ ``` toml
2+ [advisory ]
3+ id = " HSEC-0000-0000"
4+ keywords = [" crypto" ]
5+ [[references ]]
6+ type = " FIX"
7+ url = " https://github.com/kazu-yamamoto/crypton-certificate/commit/e353d450c381c9d6b903c4257927e0c89c97acb1"
8+
9+ [[affected ]]
10+ package = " cryptonite"
11+ cvss = " CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
12+ [[affected .versions ]]
13+ introduced = " 0.1"
14+
15+ [[affected ]]
16+ package = " crypton"
17+ cvss = " CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
18+ [[affected .versions ]]
19+ introduced = " 1.6.9"
20+ fixed = " 1.6.12"
21+
22+ ```
23+
24+ # Private key leak via inherited file descriptor
25+
26+ The X509 key reading function readKeyFile opened a file descriptor to the
27+ private key without setting the close-on-exec flag. If a child process is
28+ execed at the same time, it would inherit that file descriptor and could
29+ read the private key material.
30+
31+ Impact is limited to child processes that drop permissions before running
32+ untrusted code, but that do not close inherited file descriptors. (For
33+ example, the "su" command.)
34+
35+ This leak was fixed by setting the close-on-exec flag on unix-based
36+ systems.
You can’t perform that action at this time.
0 commit comments