Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2023-06242

Опубликовано: 02 авг. 2023
Источник: fstec
CVSS3: 5.3
CVSS2: 5
EPSS Низкий

Описание

Уязвимость пакета crypto/tls языка программирования Go связана с неконтролируемым расходом ресурсов. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, вызвать отказ в обслуживании с помощью специально созданного сертификата с ключами RSA

Вендор

Novell Inc.
Red Hat Inc.
Сообщество свободного программного обеспечения
The Go Project
NetApp Inc.

Наименование ПО

OpenSUSE Leap
Red Hat Enterprise Linux
SUSE Linux Enterprise Server for SAP Applications
Suse Linux Enterprise Server
Debian GNU/Linux
openSUSE Tumbleweed
Red Hat Storage
Red Hat 3scale API Management Platform
Red Hat Integration Service Registry
Openshift Service Mesh
Red Hat Openshift Data Foundation
Red Hat Advanced Cluster Management for Kubernetes
Red Hat OpenShift GitOps
Red Hat OpenShift Container Platform
Suse Linux Enterprise Desktop
Red Hat OpenStack Platform
Red Hat Web Terminal
Node Maintenance Operator
Application Interconnect
OpenShift Developer Tools and Services
Red Hat Ceph Storage
Service Telemetry Framework
Red Hat OpenShift on AWS
Red Hat OpenShift Data Science (RHODS)
Node HealthCheck Operator
Network Observability Operator
Migration Toolkit for Applications
Migration Toolkit for Virtualization
Red Hat OpenShift Virtualization
OpenShift Serverless
Red Hat Ansible Automation Platform
Red Hat Developer Tools
Red Hat Advanced Cluster Security
Red Hat OpenShift Dev Spaces
Go
Self Node Remediation
Migration Toolkit for Containers
OpenShift Secondary Scheduler Operator
OpenShift Pipelines
OpenShift API for Data Protection
Logical Volume Manager Storage Operator
Cloud Insights Telegraf Agent
Astra Control Center

Версия ПО

15.5 (OpenSUSE Leap)
8 (Red Hat Enterprise Linux)
15 SP1 (SUSE Linux Enterprise Server for SAP Applications)
12 SP5 (Suse Linux Enterprise Server)
12 SP5 (SUSE Linux Enterprise Server for SAP Applications)
10 (Debian GNU/Linux)
- (openSUSE Tumbleweed)
3 (Red Hat Storage)
15 SP1-LTSS (Suse Linux Enterprise Server)
2 (Red Hat 3scale API Management Platform)
- (Red Hat Integration Service Registry)
2 (Openshift Service Mesh)
11 (Debian GNU/Linux)
12 (Debian GNU/Linux)
15.4 (OpenSUSE Leap)
15 SP3 (SUSE Linux Enterprise Server for SAP Applications)
4 (Red Hat Openshift Data Foundation)
15 SP2 (SUSE Linux Enterprise Server for SAP Applications)
2 (Red Hat Advanced Cluster Management for Kubernetes)
- (Red Hat OpenShift GitOps)
15 SP4 (Suse Linux Enterprise Server)
4 (Red Hat OpenShift Container Platform)
15 SP4 (Suse Linux Enterprise Desktop)
15 SP4 (SUSE Linux Enterprise Server for SAP Applications)
9 (Red Hat Enterprise Linux)
15 SP2-LTSS (Suse Linux Enterprise Server)
16.2 (Red Hat OpenStack Platform)
- (Red Hat Web Terminal)
- (Node Maintenance Operator)
1.0 (Application Interconnect)
- (OpenShift Developer Tools and Services)
15 SP3-LTSS (Suse Linux Enterprise Server)
17.0 (Red Hat OpenStack Platform)
5 (Red Hat Ceph Storage)
15 SP5 (SUSE Linux Enterprise Server for SAP Applications)
15 SP5 (Suse Linux Enterprise Server)
15 SP5 (Suse Linux Enterprise Desktop)
1.5 for RHEL 8 (Service Telemetry Framework)
- (Red Hat OpenShift on AWS)
- (Red Hat OpenShift Data Science (RHODS))
- (Node HealthCheck Operator)
- (Network Observability Operator)
6 (Migration Toolkit for Applications)
- (Migration Toolkit for Virtualization)
4 (Red Hat OpenShift Virtualization)
- (OpenShift Serverless)
2 (Red Hat Ansible Automation Platform)
- (Red Hat Developer Tools)
17.1 (Red Hat OpenStack Platform)
3 (Red Hat Advanced Cluster Security)
- (Red Hat OpenShift Dev Spaces)
до 1.19.12 (Go)
от 1.20.0 до 1.20.7 (Go)
от 1.21.0-0 до 1.21.0-rc4 (Go)
- (Self Node Remediation)
- (Migration Toolkit for Containers)
- (OpenShift Secondary Scheduler Operator)
- (OpenShift Pipelines)
- (OpenShift API for Data Protection)
- (Logical Volume Manager Storage Operator)
4 (Red Hat Advanced Cluster Security)
- (Cloud Insights Telegraf Agent)
- (Astra Control Center)

Тип ПО

Операционная система
Прикладное ПО информационных систем
Сетевое средство
ПО программно-аппаратного средства
ПО виртуализации/ПО виртуального программно-аппаратного средства
Сетевое программное средство

Операционные системы и аппаратные платформы

Novell Inc. OpenSUSE Leap 15.5
Red Hat Inc. Red Hat Enterprise Linux 8
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP1
Novell Inc. Suse Linux Enterprise Server 12 SP5
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP5
Сообщество свободного программного обеспечения Debian GNU/Linux 10
Novell Inc. openSUSE Tumbleweed -
Novell Inc. Suse Linux Enterprise Server 15 SP1-LTSS
Сообщество свободного программного обеспечения Debian GNU/Linux 11
Сообщество свободного программного обеспечения Debian GNU/Linux 12
Novell Inc. OpenSUSE Leap 15.4
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP3
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP2
Novell Inc. Suse Linux Enterprise Server 15 SP4
Novell Inc. Suse Linux Enterprise Desktop 15 SP4
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP4
Red Hat Inc. Red Hat Enterprise Linux 9
Novell Inc. Suse Linux Enterprise Server 15 SP2-LTSS
Novell Inc. Suse Linux Enterprise Server 15 SP3-LTSS
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP5
Novell Inc. Suse Linux Enterprise Server 15 SP5
Novell Inc. Suse Linux Enterprise Desktop 15 SP5

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 5)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,3)

Возможные меры по устранению уязвимости

Использование рекомендаций:
Для Go:
https://pkg.go.dev/vuln/GO-2023-1987
https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ
Для программных продуктов Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2023-29409
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2023-29409.html
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/cve-2023-29409
Для программных продуктов NetApp Inc:
https://security.netapp.com/advisory/ntap-20230831-0010/

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 25%
0.00082
Низкий

5.3 Medium

CVSS3

5 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 2 года назад

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
redhat
почти 2 года назад

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
nvd
почти 2 года назад

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
debian
почти 2 года назад

Extremely large RSA keys in certificate chains can cause a client/serv ...

suse-cvrf
больше 1 года назад

Security update for Golang Prometheus

EPSS

Процентиль: 25%
0.00082
Низкий

5.3 Medium

CVSS3

5 Medium

CVSS2