A race condition exists in the Tang server functionality for key generation and key rotation. This flaw results in a small time window where Tang private keys become readable by other processes on the same host.
                
            References
                    | Link | Resource | 
|---|---|
| https://access.redhat.com/security/cve/CVE-2023-1672 | Third Party Advisory | 
| https://bugzilla.redhat.com/show_bug.cgi?id=2180999 | Issue Tracking Patch Third Party Advisory | 
| https://github.com/latchset/tang/commit/8dbbed10870378f1b2c3cf3df2ea7edca7617096 | Patch | 
| https://lists.debian.org/debian-lts-announce/2023/11/msg00004.html | |
| https://www.openwall.com/lists/oss-security/2023/06/15/1 | Exploit Mailing List Third Party Advisory | 
| https://access.redhat.com/security/cve/CVE-2023-1672 | Third Party Advisory | 
| https://bugzilla.redhat.com/show_bug.cgi?id=2180999 | Issue Tracking Patch Third Party Advisory | 
| https://github.com/latchset/tang/commit/8dbbed10870378f1b2c3cf3df2ea7edca7617096 | Patch | 
| https://lists.debian.org/debian-lts-announce/2023/11/msg00004.html | |
| https://www.openwall.com/lists/oss-security/2023/06/15/1 | Exploit Mailing List Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 07:39
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://access.redhat.com/security/cve/CVE-2023-1672 - Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2180999 - Issue Tracking, Patch, Third Party Advisory | |
| References | () https://github.com/latchset/tang/commit/8dbbed10870378f1b2c3cf3df2ea7edca7617096 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2023/11/msg00004.html - | |
| References | () https://www.openwall.com/lists/oss-security/2023/06/15/1 - Exploit, Mailing List, Third Party Advisory | 
20 Jul 2023, 02:04
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (MISC) https://www.openwall.com/lists/oss-security/2023/06/15/1 - Exploit, Mailing List, Third Party Advisory | |
| References | (MISC) https://access.redhat.com/security/cve/CVE-2023-1672 - Third Party Advisory | |
| References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2180999 - Issue Tracking, Patch, Third Party Advisory | |
| References | (MISC) https://github.com/latchset/tang/commit/8dbbed10870378f1b2c3cf3df2ea7edca7617096 - Patch | |
| CPE | cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:tang_project:tang:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 5.3 | 
| CWE | CWE-362 | 
11 Jul 2023, 12:43
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-07-11 12:15
Updated : 2024-11-21 07:39
NVD link : CVE-2023-1672
Mitre link : CVE-2023-1672
CVE.ORG link : CVE-2023-1672
JSON object : View
Products Affected
                fedoraproject
- fedora
redhat
- enterprise_linux
tang_project
- tang
CWE
                
                    
                        
                        CWE-362
                        
            Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
