First published: Wed Mar 22 2023(Updated: )
A race condition exists in the Tang server functionality for key generation and key rotation, which results in a small time window where Tang private keys become readable by other processes on the same host. References: <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=2180990">https://bugzilla.redhat.com/show_bug.cgi?id=2180990</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tang | <14.1 | 14.1 |
Tang Project Tang | <14 | |
Fedoraproject Fedora | =38 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1672 is a vulnerability that exists in the Tang server functionality for key generation and key rotation, allowing Tang private keys to become readable by other processes on the same host.
The severity of CVE-2023-1672 is medium with a CVSS score of 5.3.
The Tang server functionality in tang_project:tang up to version 14, fedoraproject:fedora version 38, redhat:enterprise_linux version 8.0, and redhat:enterprise_linux version 9.0 are affected by CVE-2023-1672.
You can fix CVE-2023-1672 by updating the Tang server software to a version that addresses the race condition vulnerability.
You can find more information about CVE-2023-1672 on the Red Hat Security Advisory and the Openwall mailing list.