|Affected Products:||Tang versions prior to 14|
|Class:||Insecure Inherited Permissions (CWE-277)|
|Discovered by:||Brian McDermott|
The Tang open source software is used to bind data to network presence. It is commonly used along with Clevis clients to provide for unattended LUKS decryption of server storage volumes within the realms of a network, where a trusted Tang server is situated. CENSUS identified that the Tang software in versions 11, 12 and 13 (and possibly previous versions) is vulnerable to a form of race condition, where the Tang private keys become exposed for a small time window to other users on the same host. The issue is tracked as CVE-2023-1672. Users are recommended to upgrade to Tang version 14 where the issue has been sufficiently addressed.
Hello, my name is Nikos Naziridis and I am a security researcher at CENSUS.
In this post, I will present how SystemTap and kernel instrumentation
in general, could be used to aid the process of determining
the exploitability of unbound memory overflows and the detection of
thread race condition bugs.