First published: Thu Jul 13 2023(Updated: )
### Impact Keylime `registrar` is prone to a simple denial of service attack in which an adversary opens a connection to the TLS port (by default, port `8891`) blocking further, legitimate connections. As long as the connection is open, the `registrar` is blocked and cannot serve any further clients (`agents` and `tenants`), which prevents normal operation. The problem does not affect the `verifier`. ### Patches Users should upgrade to release 7.4.0
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/keylime | <7.5.0 | 7.5.0 |
Keylime Keylime | ||
Redhat Enterprise Linux | =9.0 | |
Fedoraproject Fedora | ||
=9.0 | ||
=9.2 | ||
=9.0_s390x | ||
=9.2_s390x | ||
=9.0_ppc64le | ||
=9.0_ppc64le | ||
=9.2 | ||
=38 | ||
pip/keylime | <7.4.0 | 7.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38200 is a vulnerability found in Keylime that allows for a denial of service attack.
The impact of CVE-2023-38200 is that an adversary can open a connection to the TLS port, blocking legitimate connections and preventing the `registrar` from serving any further clients.
Keylime, Red Hat Enterprise Linux 9.0, Fedora, and keylime package versions up to and excluding 7.4.0 are affected by CVE-2023-38200.
The severity of CVE-2023-38200 is high, with a severity value of 7.5.
To fix CVE-2023-38200, update to keylime version 7.5.0 or newer.