Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions advisories/hackage/crypton-x509-store/HSEC-2025-0006.md
1 change: 1 addition & 0 deletions advisories/hackage/x509-store/HSEC-2025-0006.md
38 changes: 38 additions & 0 deletions advisories/published/2025/HSEC-2025-0006.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
```toml
[advisory]
id = "HSEC-2025-0006"
keywords = ["crypto"]
cwe = [403]

[[references]]
type = "FIX"
url = "https://github.com/kazu-yamamoto/crypton-certificate/commit/e353d450c381c9d6b903c4257927e0c89c97acb1"

[[affected]]
package = "x509-store"
cvss = "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
[[affected.versions]]
introduced = "0.1"

[[affected]]
package = "crypton-x509-store"
cvss = "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
[[affected.versions]]
introduced = "1.6.9"
fixed = "1.6.12"
```

# Private key leak via inherited file descriptor

The X.509 key reading function `readKeyFile` opened a file
descriptor to the private key without setting the *close-on-exec*
flag. If a child process is `exec`ed at the same time, it would
inherit that file descriptor and could read the private key
material.

Impact is limited to child processes that run untrusted code, but
that do not close inherited file descriptors. (For example, the
`su(1)` command.)

This leak was fixed by setting the *close-on-exec* flag on
unix-based systems.
Loading