Skip to content

Conversation

@larsewi
Copy link
Contributor

@larsewi larsewi commented Dec 11, 2025

$ openssl genrsa -out small.priv 2048
$ openssl rsa -in small.priv -RSAPublicKey_out -out small.pub
writing RSA key
$ openssl genrsa -out large.priv 4096
$ openssl rsa -in large.priv -RSAPublicKey_out -out large.pub
writing RSA key
$ echo "Secret Data" > secret.txt
$ cf-secret encrypt -k small.pub,large.pub -o secret.enc secret.txt
free(): invalid next size (normal)
Aborted (core dumped)

Ticket: ENT-13591
Changelog: Title
Signed-off-by: Lars Erik Wik lars.erik.wik@northern.tech

Backported to #6000

…ent sizes

```
$ openssl genrsa -out small.priv 2048
$ openssl rsa -in small.priv -RSAPublicKey_out -out small.pub
writing RSA key
$ openssl genrsa -out large.priv 4096
$ openssl rsa -in large.priv -RSAPublicKey_out -out large.pub
writing RSA key
$ echo "Secret Data" > secret.txt
$ cf-secret encrypt -k small.pub,large.pub -o secret.enc secret.txt
free(): invalid next size (normal)
Aborted (core dumped)
```

Ticket: ENT-13591
Changelog: Title
Signed-off-by: Lars Erik Wik <lars.erik.wik@northern.tech>
@larsewi larsewi changed the title Fixed buffer overflow in cf-secret when using multiple keys of different sizes ENT-13591: Fixed buffer overflow in cf-secret when using multiple keys of different sizes Dec 11, 2025
@larsewi larsewi marked this pull request as ready for review December 11, 2025 11:25
@larsewi larsewi added the cherry-pick? Fixes which may need to be cherry-picked to LTS branches label Dec 15, 2025
@larsewi
Copy link
Contributor Author

larsewi commented Dec 15, 2025

Build Status

@larsewi larsewi removed the cherry-pick? Fixes which may need to be cherry-picked to LTS branches label Dec 15, 2025
@cfengine cfengine deleted a comment from cf-bottom Dec 16, 2025
@larsewi larsewi merged commit 6e7aec4 into cfengine:master Dec 18, 2025
46 of 49 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

2 participants