drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Preisgabe von Informationen in Tang
Name: |
Preisgabe von Informationen in Tang |
|
ID: |
USN-6489-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.04, Ubuntu 18.04 LTS (Available with Ubuntu Pro) |
|
Datum: |
Mo, 20. November 2023, 20:39 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1672 |
|
Applikationen: |
Tang |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============7297935595920001786== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------EbWTuDG136CakvHlMav80FoM"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------EbWTuDG136CakvHlMav80FoM Content-Type: multipart/mixed; boundary="------------aZ5Xkzk7wgZDsyBIePnG10op"; protected-headers="v1" From: Jorge Sancho Larraz <jorge.sancho.larraz@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <e942a9ed-f730-4556-8512-821d6be1e904@canonical.com> Subject: [USN-6489-1] Tang vulnerability
--------------aZ5Xkzk7wgZDsyBIePnG10op Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-6489-1 November 20, 2023
tang vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.04 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS (Available with Ubuntu Pro)
Summary:
Tang could allow unintended access to secret keys.
Software Description: - tang: network-based cryptographic binding server
Details:
Brian McDermott discovered that Tang incorrectly handled permissions when creating/rotating keys. A local attacker could possibly use this issue to read the keys.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.04: tang-common 11-2ubuntu0.1
Ubuntu 22.04 LTS: tang-common 11-1ubuntu0.1
Ubuntu 20.04 LTS: tang 7-1ubuntu0.2
Ubuntu 18.04 LTS (Available with Ubuntu Pro): tang 6-1ubuntu0.1~esm1
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-6489-1 CVE-2023-1672
Package Information: https://launchpad.net/ubuntu/+source/tang/11-2ubuntu0.1 https://launchpad.net/ubuntu/+source/tang/11-1ubuntu0.1 https://launchpad.net/ubuntu/+source/tang/7-1ubuntu0.2
--------------aZ5Xkzk7wgZDsyBIePnG10op--
--------------EbWTuDG136CakvHlMav80FoM Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsF5BAABCAAjFiEEKQtTo2MNG44yJq/lXjZQcrWpV2YFAmVbkm0FAwAAAAAACgkQXjZQcrWpV2ac QQ//R4CWVGhqiKZ7TaeGdkxyF09vQnMNtYEEHRO88Z+oTI5Ax7cA7MPWPc8CXVr14Xwyt/3IAZBk QiAU07KJwhJRfXXxAAIkBaQGAUZkNB/+/URtjiyVKXl4g3COZvK9/S2AT+3r7IS0hUJ+FCUErthP bmVmEIkFmWd6pJj19vQa2TjIeKVTOLzbpxhbzGv0PyqziE5pRPIpUR66DoI92vJ1c+U6lWwjWidV Sv4dRxKuufUK3zCZXxdETSyrWZ5HYFK2t85T3WLM3tCghb7D2Ssx6X1kNNNQDP2TKEQ62qAlg4H5 M1vQR+lymtbJwjJ7UXqJ7kKlIv6w8L54GQN9DbY1Znmqtq9SLxxXpDY8Fd46RH2SPDXb6EzLcJTz 3IyoWfHwxIpMhpHyxbAjdSCJHBWKLhrdrzYf2U46khbPSiEyg2IMiAh3tb82wOdZJDvZmvNLlcg3 tp4Rgc9hDn0cWvTTkbsBqy4elVZZ71xzRfQQfVbYd0m1eGQ/PnR4nlf0aaH8l4nhd6w7cr2two2F A5q12aXjUIXIAVsyvULCmMW4xId5Ee7jlszfa5TipQwcaIvbhpP4HLCutM5LWi7F9xLE43BNfjvs pfb/0Ii4mxjp3aTqEM/+Ojf8kbSJAQHe9oRMJjh6d5f44j5HkJ6bjWqfAQi2onqroGaRQSdoBaHd 2RU= =fxH9 -----END PGP SIGNATURE-----
--------------EbWTuDG136CakvHlMav80FoM--
--===============7297935595920001786== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============7297935595920001786==--
|
|
|
|