CVE-2023-1672

A race condition exists in the Tang server functionality for key generation and key rotation. This flaw results in a small time window where Tang private keys become readable by other processes on the same host.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tang_project:tang:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:39

Type Values Removed Values Added
References () https://access.redhat.com/security/cve/CVE-2023-1672 - Third Party Advisory () https://access.redhat.com/security/cve/CVE-2023-1672 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2180999 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2180999 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/latchset/tang/commit/8dbbed10870378f1b2c3cf3df2ea7edca7617096 - Patch () https://github.com/latchset/tang/commit/8dbbed10870378f1b2c3cf3df2ea7edca7617096 - Patch
References () https://lists.debian.org/debian-lts-announce/2023/11/msg00004.html - () https://lists.debian.org/debian-lts-announce/2023/11/msg00004.html -
References () https://www.openwall.com/lists/oss-security/2023/06/15/1 - Exploit, Mailing List, Third Party Advisory () https://www.openwall.com/lists/oss-security/2023/06/15/1 - Exploit, Mailing List, Third Party Advisory

07 Nov 2023, 21:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2023/11/msg00004.html -

20 Jul 2023, 02:04

Type Values Removed Values Added
CWE CWE-362
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
First Time Fedoraproject
Redhat
Tang Project tang
Fedoraproject fedora
Redhat enterprise Linux
Tang Project
CPE cpe:2.3:a:tang_project:tang:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
References (MISC) https://github.com/latchset/tang/commit/8dbbed10870378f1b2c3cf3df2ea7edca7617096 - (MISC) https://github.com/latchset/tang/commit/8dbbed10870378f1b2c3cf3df2ea7edca7617096 - Patch
References (MISC) https://access.redhat.com/security/cve/CVE-2023-1672 - (MISC) https://access.redhat.com/security/cve/CVE-2023-1672 - Third Party Advisory
References (MISC) https://www.openwall.com/lists/oss-security/2023/06/15/1 - (MISC) https://www.openwall.com/lists/oss-security/2023/06/15/1 - Exploit, Mailing List, Third Party Advisory
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2180999 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2180999 - Issue Tracking, Patch, Third Party Advisory

11 Jul 2023, 12:43

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-11 12:15

Updated : 2024-11-21 07:39


NVD link : CVE-2023-1672

Mitre link : CVE-2023-1672

CVE.ORG link : CVE-2023-1672


JSON object : View

Products Affected

tang_project

  • tang

redhat

  • enterprise_linux

fedoraproject

  • fedora
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')