An update for tang is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2023-1403 Final 1.0 1.0 2023-07-08 Initial 2023-07-08 2023-07-08 openEuler SA Tool V1.0 2023-07-08 tang security update An update for tang is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2. This package is a server for binding data to network presence. First, the client gets a list of the Tang server's advertised asymmetric keys. This can happen online by a simple HTTP GET. Alternatively, since the keys are asymmetric, the public key list can be distributed out of band. Second, the client uses one of these public keys to generate a unique, cryptographically strong encryption key. The data is then encrypted using this key. Once the data is encrypted, the key is discarded. Some small metadata is produced as part of this operation which the client should store in a convenient location. This process of encrypting data is the provisioning step. Third, when the client is ready to access its data, it simply loads the metadata produced in the provisioning step and performs an HTTP POST in order to recover the encryption key. This process is the recovery step. Security Fix(es): A race condition exists in the Tang server functionality for key generation and key rotation. This flaw results in a small time window where Tang private keys become readable by other processes on the same host.(CVE-2023-1672) An update for tang is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2. openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Medium tang https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1403 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-1672 https://nvd.nist.gov/vuln/detail/CVE-2023-1672 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 openEuler-22.03-LTS-SP2 tang-7-4.oe1.aarch64.rpm tang-debugsource-7-4.oe1.aarch64.rpm tang-debuginfo-7-4.oe1.aarch64.rpm tang-7-4.oe1.aarch64.rpm tang-debuginfo-7-4.oe1.aarch64.rpm tang-debugsource-7-4.oe1.aarch64.rpm tang-debugsource-7-3.oe2203.aarch64.rpm tang-debuginfo-7-3.oe2203.aarch64.rpm tang-7-3.oe2203.aarch64.rpm tang-debuginfo-7-3.oe2203sp1.aarch64.rpm tang-debugsource-7-3.oe2203sp1.aarch64.rpm tang-7-3.oe2203sp1.aarch64.rpm tang-debugsource-7-3.oe2203sp2.aarch64.rpm tang-debuginfo-7-3.oe2203sp2.aarch64.rpm tang-7-3.oe2203sp2.aarch64.rpm tang-help-7-4.oe1.noarch.rpm tang-help-7-4.oe1.noarch.rpm tang-help-7-3.oe2203.noarch.rpm tang-help-7-3.oe2203sp1.noarch.rpm tang-help-7-3.oe2203sp2.noarch.rpm tang-7-4.oe1.src.rpm tang-7-4.oe1.src.rpm tang-7-3.oe2203.src.rpm tang-7-3.oe2203sp1.src.rpm tang-7-3.oe2203sp2.src.rpm tang-debugsource-7-4.oe1.x86_64.rpm tang-7-4.oe1.x86_64.rpm tang-debuginfo-7-4.oe1.x86_64.rpm tang-debugsource-7-4.oe1.x86_64.rpm tang-debuginfo-7-4.oe1.x86_64.rpm tang-7-4.oe1.x86_64.rpm tang-7-3.oe2203.x86_64.rpm tang-debugsource-7-3.oe2203.x86_64.rpm tang-debuginfo-7-3.oe2203.x86_64.rpm tang-7-3.oe2203sp1.x86_64.rpm tang-debuginfo-7-3.oe2203sp1.x86_64.rpm tang-debugsource-7-3.oe2203sp1.x86_64.rpm tang-7-3.oe2203sp2.x86_64.rpm tang-debugsource-7-3.oe2203sp2.x86_64.rpm tang-debuginfo-7-3.oe2203sp2.x86_64.rpm A race condition exists in the Tang server functionality for key generation and key rotation. This flaw results in a small time window where Tang private keys become readable by other processes on the same host. 2023-07-08 CVE-2023-1672 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 openEuler-22.03-LTS-SP2 Medium 5.3 AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N tang security update 2023-07-08 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1403