SB2023080309 - Multiple vulnerabilities in Keylime
Published: August 3, 2023 Updated: September 5, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2023-38200)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the registrar. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
2) Security features bypass (CVE-ID: CVE-2023-3674)
The vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to an error in the keylime attestation verifier, which fails to flag a device's submitted TPM quote as faulty when the quote's signature does not validate for some reason. Instead, it will only emit an error in the log without flagging the device as untrusted.
Remediation
Install update from vendor's website.
References
- https://access.redhat.com/security/cve/CVE-2023-38200
- https://github.com/keylime/keylime/pull/1421
- https://bugzilla.redhat.com/show_bug.cgi?id=2222692
- https://access.redhat.com/security/cve/CVE-2023-3674
- https://bugzilla.redhat.com/show_bug.cgi?id=2222903
- https://github.com/keylime/keylime/commit/95ce3d86bd2c53009108ffda2dcf553312d733db