Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-45287

Опубликовано: 05 дек. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.5

Описание

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

DNE

esm-infra/focal

DNE

focal

DNE

jammy

DNE

lunar

ignored

end of life, was needs-triage
mantic

DNE

noble

DNE

oracular

DNE

plucky

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

DNE

esm-infra/focal

DNE

focal was needs-triage
focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

lunar

ignored

end of life, was needs-triage
mantic

ignored

end of life, was needs-triage
noble

DNE

oracular

DNE

plucky

DNE

Показывать по

EPSS

Процентиль: 41%
0.00185
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 1 года назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
nvd
больше 1 года назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
debian
больше 1 года назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big libr ...

CVSS3: 7.5
github
больше 1 года назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

oracle-oval
больше 1 года назад

ELSA-2024-2239: skopeo security update (MODERATE)

EPSS

Процентиль: 41%
0.00185
Низкий

7.5 High

CVSS3