Количество 5
Количество 5
CVE-2025-1057
A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions store agent registration data as bytes, whereas the updated registrar expects str. This issue leads to an exception when processing agent registration requests, causing the agent to fail.
CVE-2025-1057
A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions store agent registration data as bytes, whereas the updated registrar expects str. This issue leads to an exception when processing agent registration requests, causing the agent to fail.
CVE-2025-1057
A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions store agent registration data as bytes, whereas the updated registrar expects str. This issue leads to an exception when processing agent registration requests, causing the agent to fail.
GHSA-9jxq-5x44-gx23
Keylime registrar is vulnerable to Denial-of-Service attack when updated to version 7.12.0
openSUSE-SU-2025:20159-1
Security update for keylime
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-1057 A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions store agent registration data as bytes, whereas the updated registrar expects str. This issue leads to an exception when processing agent registration requests, causing the agent to fail. | CVSS3: 4.3 | 0% Низкий | 10 месяцев назад | |
CVE-2025-1057 A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions store agent registration data as bytes, whereas the updated registrar expects str. This issue leads to an exception when processing agent registration requests, causing the agent to fail. | CVSS3: 4.3 | 0% Низкий | 11 месяцев назад | |
CVE-2025-1057 A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions store agent registration data as bytes, whereas the updated registrar expects str. This issue leads to an exception when processing agent registration requests, causing the agent to fail. | CVSS3: 4.3 | 0% Низкий | 10 месяцев назад | |
GHSA-9jxq-5x44-gx23 Keylime registrar is vulnerable to Denial-of-Service attack when updated to version 7.12.0 | CVSS3: 4.3 | 0% Низкий | 11 месяцев назад | |
openSUSE-SU-2025:20159-1 Security update for keylime | 19 дней назад |
Уязвимостей на страницу