An update for tang is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2023-1403
Final
1.0
1.0
2023-07-08
Initial
2023-07-08
2023-07-08
openEuler SA Tool V1.0
2023-07-08
tang security update
An update for tang is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2.
This package is a server for binding data to network presence. First, the client gets a list of the Tang server's advertised asymmetric keys. This can happen online by a simple HTTP GET. Alternatively, since the keys are asymmetric, the public key list can be distributed out of band. Second, the client uses one of these public keys to generate a unique, cryptographically strong encryption key. The data is then encrypted using this key. Once the data is encrypted, the key is discarded. Some small metadata is produced as part of this operation which the client should store in a convenient location. This process of encrypting data is the provisioning step. Third, when the client is ready to access its data, it simply loads the metadata produced in the provisioning step and performs an HTTP POST in order to recover the encryption key. This process is the recovery step.
Security Fix(es):
A race condition exists in the Tang server functionality for key generation and key rotation. This flaw results in a small time window where Tang private keys become readable by other processes on the same host.(CVE-2023-1672)
An update for tang is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Medium
tang
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1403
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-1672
https://nvd.nist.gov/vuln/detail/CVE-2023-1672
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
openEuler-22.03-LTS-SP2
tang-7-4.oe1.aarch64.rpm
tang-debugsource-7-4.oe1.aarch64.rpm
tang-debuginfo-7-4.oe1.aarch64.rpm
tang-7-4.oe1.aarch64.rpm
tang-debuginfo-7-4.oe1.aarch64.rpm
tang-debugsource-7-4.oe1.aarch64.rpm
tang-debugsource-7-3.oe2203.aarch64.rpm
tang-debuginfo-7-3.oe2203.aarch64.rpm
tang-7-3.oe2203.aarch64.rpm
tang-debuginfo-7-3.oe2203sp1.aarch64.rpm
tang-debugsource-7-3.oe2203sp1.aarch64.rpm
tang-7-3.oe2203sp1.aarch64.rpm
tang-debugsource-7-3.oe2203sp2.aarch64.rpm
tang-debuginfo-7-3.oe2203sp2.aarch64.rpm
tang-7-3.oe2203sp2.aarch64.rpm
tang-help-7-4.oe1.noarch.rpm
tang-help-7-4.oe1.noarch.rpm
tang-help-7-3.oe2203.noarch.rpm
tang-help-7-3.oe2203sp1.noarch.rpm
tang-help-7-3.oe2203sp2.noarch.rpm
tang-7-4.oe1.src.rpm
tang-7-4.oe1.src.rpm
tang-7-3.oe2203.src.rpm
tang-7-3.oe2203sp1.src.rpm
tang-7-3.oe2203sp2.src.rpm
tang-debugsource-7-4.oe1.x86_64.rpm
tang-7-4.oe1.x86_64.rpm
tang-debuginfo-7-4.oe1.x86_64.rpm
tang-debugsource-7-4.oe1.x86_64.rpm
tang-debuginfo-7-4.oe1.x86_64.rpm
tang-7-4.oe1.x86_64.rpm
tang-7-3.oe2203.x86_64.rpm
tang-debugsource-7-3.oe2203.x86_64.rpm
tang-debuginfo-7-3.oe2203.x86_64.rpm
tang-7-3.oe2203sp1.x86_64.rpm
tang-debuginfo-7-3.oe2203sp1.x86_64.rpm
tang-debugsource-7-3.oe2203sp1.x86_64.rpm
tang-7-3.oe2203sp2.x86_64.rpm
tang-debugsource-7-3.oe2203sp2.x86_64.rpm
tang-debuginfo-7-3.oe2203sp2.x86_64.rpm
A race condition exists in the Tang server functionality for key generation and key rotation. This flaw results in a small time window where Tang private keys become readable by other processes on the same host.
2023-07-08
CVE-2023-1672
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
openEuler-22.03-LTS-SP2
Medium
5.3
AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
tang security update
2023-07-08
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1403