CVE-2025-1057

medium

Description

A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions store agent registration data as bytes, whereas the updated registrar expects str. This issue leads to an exception when processing agent registration requests, causing the agent to fail.

References

https://bugzilla.redhat.com/show_bug.cgi?id=2343894

https://access.redhat.com/security/cve/CVE-2025-1057

Details

Source: Mitre, NVD

Published: 2025-03-15

Updated: 2025-03-15

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Severity: Medium

CVSS v3

Base Score: 4.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

Severity: Medium

EPSS

EPSS: 0.00038