Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process. The following link provides references to all essential vulnerability management information. If something is wrong or missing, please contact a member of PSIRT. https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essential+Documents+for+Engineering+Teams
Seems like mkcert isn't vulnerable, I checked the usage of "LookPath" and it isn't possible to inject . or .. into the LookPath call. Besides that, mkcert is meant to be used locally by the system administrator. I can't think of a way how this could even be exploitable by a non administrator. $ git grep -i lookpath main.go: _, err := exec.LookPath(name) truststore_nss.go: certutilPath, _ = exec.LookPath("certutil") truststore_nss.go: certutilPath, _ = exec.LookPath("certutil") $ git grep -i binaryExists main.go:func binaryExists(name string) bool { main.go: if !binaryExists("sudo") { truststore_linux.go: case binaryExists("apt"): truststore_linux.go: case binaryExists("yum"): truststore_linux.go: case binaryExists("zypper"): truststore_nss.go: case binaryExists("certutil"): truststore_nss.go: case binaryExists("/usr/local/opt/nss/bin/certutil"): truststore_nss.go: if hasCertutil = binaryExists("certutil"); hasCertutil {