A race condition exists in the Tang server functionality for key generation and key rotation. This flaw results in a small time window where Tang private keys become readable by other processes on the same host.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2023-1672 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2180999 | Issue Tracking Patch Third Party Advisory |
https://github.com/latchset/tang/commit/8dbbed10870378f1b2c3cf3df2ea7edca7617096 | Patch |
https://lists.debian.org/debian-lts-announce/2023/11/msg00004.html | |
https://www.openwall.com/lists/oss-security/2023/06/15/1 | Exploit Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-07-11 12:15
Updated : 2023-11-07 21:15
NVD link : CVE-2023-1672
Mitre link : CVE-2023-1672
CVE.ORG link : CVE-2023-1672
JSON object : View
Products Affected
redhat
- enterprise_linux
fedoraproject
- fedora
tang_project
- tang
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')