CVE-2022-31124: Possible leak of key's raw field if declared length is incorrect
(updated )
If a field of a key is shorter than it is declared to be, the parser raises an error with a message containing the raw field value. An attacker able to modify the declared length of a key’s sensitive field can thus expose the raw value of that field.
References
- github.com/advisories/GHSA-hm37-9xh2-q499
- github.com/pypa/advisory-database/tree/main/vulns/openssh-key-parser/PYSEC-2022-233.yaml
- github.com/scottcwang/openssh_key_parser
- github.com/scottcwang/openssh_key_parser/commit/26e0a471e9fdb23e635bc3014cf4cbd2323a08d3
- github.com/scottcwang/openssh_key_parser/commit/274447f91b4037b7050ae634879b657554523b39
- github.com/scottcwang/openssh_key_parser/commit/d5b53b4b7e76c5b666fc657019dbf864fb04076c
- github.com/scottcwang/openssh_key_parser/pull/5
- github.com/scottcwang/openssh_key_parser/security/advisories/GHSA-hm37-9xh2-q499
- nvd.nist.gov/vuln/detail/CVE-2022-31124
Detect and mitigate CVE-2022-31124 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →