A flaw was found in Keylime before 6.3.0. The logic in the Keylime agent for checking for a secure mount can be fooled by previously created unprivileged mounts allowing secrets to be leaked to other processes on the host.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://seclists.org/oss-sec/2022/q1/101 | patch mailing list third party advisory exploit |
https://github.com/keylime/keylime/security/advisories/GHSA-wj36-qcfg-5j52 | third party advisory |
https://github.com/keylime/keylime/commit/1a4f31a6368d651222683c9debe7d6832db6f607 | patch third party advisory |
https://github.com/keylime/keylime/commit/d37c406e69cb6689baa2fb7964bad75209703724 | patch third party advisory |