Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-45287

Опубликовано: 05 дек. 2023
Источник: debian
EPSS Низкий

Описание

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
golang-1.20not-affectedpackage
golang-1.19removedpackage
golang-1.19no-dsabookwormpackage
golang-1.15removedpackage
golang-1.15no-dsabullseyepackage
golang-1.11removedpackage
golang-1.11postponedbusterpackage

Примечания

  • https://go.dev/issue/20654

  • https://go.dev/cl/326012/26

  • https://groups.google.com/g/golang-announce/c/QMK8IQALDvA

  • https://people.redhat.com/~hkario/marvin/

  • https://pkg.go.dev/vuln/GO-2023-2375

  • Fixed by: https://github.com/golang/go/commit/8a81fdf165facdcefa06531de5af98a4db343035 (go1.20rc1)

EPSS

Процентиль: 41%
0.00185
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
nvd
больше 1 года назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
github
больше 1 года назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

oracle-oval
около 1 года назад

ELSA-2024-2239: skopeo security update (MODERATE)

oracle-oval
около 1 года назад

ELSA-2024-2272: containernetworking-plugins security update (MODERATE)

EPSS

Процентиль: 41%
0.00185
Низкий