Описание
Keylime's registrar vulnerable to Denial-of-service attack via a single open connection
Impact
Keylime registrar
is prone to a simple denial of service attack in which an adversary opens a connection to the TLS port (by default, port 8891
) blocking further, legitimate connections. As long as the connection is open, the registrar
is blocked and cannot serve any further clients (agents
and tenants
), which prevents normal operation. The problem does not affect the verifier
.
Patches
Users should upgrade to release 7.4.0
Ссылки
- https://github.com/keylime/keylime/security/advisories/GHSA-pg75-v6fp-8q59
- https://nvd.nist.gov/vuln/detail/CVE-2023-38200
- https://github.com/keylime/keylime/pull/1421
- https://github.com/keylime/keylime/commit/c68d8f0b7ea549c12b6956ab0f3c28ae0360ae17
- https://access.redhat.com/security/cve/CVE-2023-38200
- https://bugzilla.redhat.com/show_bug.cgi?id=2222692
- https://github.com/keylime/keylime/releases/tag/v7.4.0
Пакеты
keylime
< 7.4.0
7.4.0
Связанные уязвимости
A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.
A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.
A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.