Certificate generation in juju/utils using the cert.NewLeaf function could include private information. If this certificate were then transferred over the network in plaintext, an attacker listening on that network could sniff the certificate and trivially extract the private key from it.
References
Link | Resource |
---|---|
https://github.com/juju/utils/security/advisories/GHSA-h34r-jxqm-qgpr | Vendor Advisory Exploit |
Configurations
History
10 Sep 2025, 16:08
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:canonical:juju\/utils:*:*:*:*:*:go:*:* | |
First Time |
Canonical
Canonical juju\/utils |
|
References | () https://github.com/juju/utils/security/advisories/GHSA-h34r-jxqm-qgpr - Vendor Advisory, Exploit |
03 Jul 2025, 15:14
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
01 Jul 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-01 11:15
Updated : 2025-09-10 16:08
NVD link : CVE-2025-6224
Mitre link : CVE-2025-6224
CVE.ORG link : CVE-2025-6224
JSON object : View
Products Affected
canonical
- juju\/utils
CWE
CWE-312
Cleartext Storage of Sensitive Information