Skip to content

Commit 1800e69

Browse files
committed
advisory: Private key leak via inherited file descriptor
1 parent 2ed7236 commit 1800e69

File tree

1 file changed

+36
-0
lines changed

1 file changed

+36
-0
lines changed
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
```toml
2+
[advisory]
3+
id = "HSEC-0000-0000"
4+
keywords = ["crypto"]
5+
[[references]]
6+
type = "FIX"
7+
url = "https://github.com/kazu-yamamoto/crypton-certificate/commit/e353d450c381c9d6b903c4257927e0c89c97acb1"
8+
9+
[[affected]]
10+
package = "cryptonite"
11+
cvss = "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
12+
[[affected.versions]]
13+
introduced = "0.1"
14+
15+
[[affected]]
16+
package = "crypton"
17+
cvss = "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
18+
[[affected.versions]]
19+
introduced = "1.6.9"
20+
fixed = "1.6.12"
21+
22+
```
23+
24+
# Private key leak via inherited file descriptor
25+
26+
The X509 key reading function readKeyFile opened a file descriptor to the
27+
private key without setting the close-on-exec flag. If a child process is
28+
execed at the same time, it would inherit that file descriptor and could
29+
read the private key material.
30+
31+
Impact is limited to child processes that drop permissions before running
32+
untrusted code, but that do not close inherited file descriptors. (For
33+
example, the "su" command.)
34+
35+
This leak was fixed by setting the close-on-exec flag on unix-based
36+
systems.

0 commit comments

Comments
 (0)