A race condition exists in the Tang server functionality for key generation and key rotation. This flaw results in a small time window where Tang private keys become readable by other processes on the same host.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2023-1672 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2180999 | Issue Tracking Patch Third Party Advisory |
| https://github.com/latchset/tang/commit/8dbbed10870378f1b2c3cf3df2ea7edca7617096 | Patch |
| https://lists.debian.org/debian-lts-announce/2023/11/msg00004.html | |
| https://www.openwall.com/lists/oss-security/2023/06/15/1 | Exploit Mailing List Third Party Advisory |
| https://access.redhat.com/security/cve/CVE-2023-1672 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2180999 | Issue Tracking Patch Third Party Advisory |
| https://github.com/latchset/tang/commit/8dbbed10870378f1b2c3cf3df2ea7edca7617096 | Patch |
| https://lists.debian.org/debian-lts-announce/2023/11/msg00004.html | |
| https://www.openwall.com/lists/oss-security/2023/06/15/1 | Exploit Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 07:39
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://access.redhat.com/security/cve/CVE-2023-1672 - Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2180999 - Issue Tracking, Patch, Third Party Advisory | |
| References | () https://github.com/latchset/tang/commit/8dbbed10870378f1b2c3cf3df2ea7edca7617096 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2023/11/msg00004.html - | |
| References | () https://www.openwall.com/lists/oss-security/2023/06/15/1 - Exploit, Mailing List, Third Party Advisory |
07 Nov 2023, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
20 Jul 2023, 02:04
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| References | (MISC) https://access.redhat.com/security/cve/CVE-2023-1672 - Third Party Advisory | |
| References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2180999 - Issue Tracking, Patch, Third Party Advisory | |
| References | (MISC) https://www.openwall.com/lists/oss-security/2023/06/15/1 - Exploit, Mailing List, Third Party Advisory | |
| References | (MISC) https://github.com/latchset/tang/commit/8dbbed10870378f1b2c3cf3df2ea7edca7617096 - Patch | |
| First Time |
Fedoraproject fedora
Redhat Redhat enterprise Linux Tang Project Tang Project tang Fedoraproject |
|
| CWE | CWE-362 | |
| CPE | cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:tang_project:tang:*:*:*:*:*:*:*:* |
11 Jul 2023, 12:43
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-07-11 12:15
Updated : 2024-11-21 07:39
NVD link : CVE-2023-1672
Mitre link : CVE-2023-1672
CVE.ORG link : CVE-2023-1672
JSON object : View
Products Affected
redhat
- enterprise_linux
tang_project
- tang
fedoraproject
- fedora
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
