GHSA-9gjg-834p-5gvv

Suggest an improvement
Source
https://github.com/advisories/GHSA-9gjg-834p-5gvv
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-9gjg-834p-5gvv/GHSA-9gjg-834p-5gvv.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-9gjg-834p-5gvv
Withdrawn
2023-08-01T20:09:43Z
Published
2023-07-24T18:30:44Z
Modified
2024-12-03T06:19:55.633792Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Duplicate Advisory: Keylime's registrar vulnerable to Denial-of-service attack via a single open connection
Details

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-pg75-v6fp-8q59. This link is maintained to preserve external references.

Original Description

A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.

Database specific
{
    "nvd_published_at": "2023-07-24T16:15:12Z",
    "cwe_ids": [],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-08-01T20:09:43Z"
}
References

Affected packages

PyPI / keylime

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.4.0

Affected versions

6.*

6.3.1
6.3.2
6.4.0
6.4.1
6.4.2
6.4.3
6.5.0
6.5.1
6.5.2
6.5.3
6.6.0
6.8.0

7.*

7.0.0
7.2.5
7.3.0