{"id":"CVE-2023-38200","details":"A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.","aliases":["GHSA-pg75-v6fp-8q59"],"modified":"2026-03-14T12:10:46.890005Z","published":"2023-07-24T16:15:12.067Z","related":["ALSA-2023:5080","SUSE-SU-2023:3245-1","openSUSE-SU-2024:13096-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZIZZB5NHNCS5D2AEH3ZAO6OQC72IK7WS/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:5080"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-38200"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222692"},{"type":"FIX","url":"https://github.com/keylime/keylime/pull/1421"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.2"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0_s390x"}]},{"events":[{"introduced":"0"},{"last_affected":"9.2_s390x"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0_ppc64le"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0_ppc64le"}]},{"events":[{"introduced":"0"},{"last_affected":"9.2"}]},{"events":[{"introduced":"0"},{"last_affected":"38"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-38200.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}