Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1wZzc1LXY2ZnAtOHE1Oc4AA0_Q
Keylime's registrar vulnerable to Denial-of-service attack via a single open connection
Impact
Keylime registrar
is prone to a simple denial of service attack in which an adversary opens a connection to the TLS port (by default, port 8891
) blocking further, legitimate connections. As long as the connection is open, the registrar
is blocked and cannot serve any further clients (agents
and tenants
), which prevents normal operation. The problem does not affect the verifier
.
Patches
Users should upgrade to release 7.4.0
Permalink: https://github.com/advisories/GHSA-pg75-v6fp-8q59JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1wZzc1LXY2ZnAtOHE1Oc4AA0_Q
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 1 year ago
Updated: about 1 year ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-pg75-v6fp-8q59, CVE-2023-38200
References:
- https://github.com/keylime/keylime/security/advisories/GHSA-pg75-v6fp-8q59
- https://nvd.nist.gov/vuln/detail/CVE-2023-38200
- https://github.com/keylime/keylime/pull/1421
- https://github.com/keylime/keylime/commit/c68d8f0b7ea549c12b6956ab0f3c28ae0360ae17
- https://access.redhat.com/security/cve/CVE-2023-38200
- https://bugzilla.redhat.com/show_bug.cgi?id=2222692
- https://github.com/keylime/keylime/releases/tag/v7.4.0
- https://github.com/advisories/GHSA-pg75-v6fp-8q59
Blast Radius: 0.0
Affected Packages
pypi:keylime
Dependent packages: 0Dependent repositories: 1
Downloads: 1,309 last month
Affected Version Ranges: < 7.4.0
Fixed in: 7.4.0
All affected versions: 6.3.1, 6.3.2, 6.4.0, 6.4.1, 6.4.2, 6.4.3, 6.5.0, 6.5.1, 6.5.2, 6.5.3, 6.6.0, 6.8.0, 7.0.0, 7.2.5, 7.3.0
All unaffected versions: 7.4.0, 7.5.0, 7.6.0, 7.7.0, 7.8.0, 7.9.0, 7.10.0