First published: Thu Jul 13 2023(Updated: )
### Impact Keylime `registrar` is prone to a simple denial of service attack in which an adversary opens a connection to the TLS port (by default, port `8891`) blocking further, legitimate connections. As long as the connection is open, the `registrar` is blocked and cannot serve any further clients (`agents` and `tenants`), which prevents normal operation. The problem does not affect the `verifier`. ### Patches Users should upgrade to release 7.4.0
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/keylime | <7.4.0 | 7.4.0 |
redhat/keylime | <7.5.0 | 7.5.0 |
Keylime (Keylime) | ||
Red Hat Enterprise Linux | =9.0 | |
Red Hat Enterprise Linux Server EUS | =9.2 | |
Red Hat Enterprise Linux for IBM Z Systems | =9.0_s390x | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =9.2_s390x | |
Red Hat Enterprise Linux for Power, little endian | =9.0_ppc64le | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =9.0_ppc64le | |
Red Hat Enterprise Linux Server | =9.2 | |
Red Hat Fedora | =38 | |
Red Hat Fedora |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38200 is a vulnerability found in Keylime that allows for a denial of service attack.
The impact of CVE-2023-38200 is that an adversary can open a connection to the TLS port, blocking legitimate connections and preventing the `registrar` from serving any further clients.
Keylime, Red Hat Enterprise Linux 9.0, Fedora, and keylime package versions up to and excluding 7.4.0 are affected by CVE-2023-38200.
The severity of CVE-2023-38200 is high, with a severity value of 7.5.
To fix CVE-2023-38200, update to keylime version 7.5.0 or newer.