Логотип exploitDog
bind:CVE-2023-45287
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-45287

Количество 15

Количество 15

ubuntu логотип

CVE-2023-45287

больше 2 лет назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2023-45287

больше 2 лет назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-45287

больше 2 лет назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2023-45287

7 месяцев назад

Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-45287

больше 2 лет назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big libr ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-33qr-2xwr-95pw

больше 2 лет назад

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2024-2239

почти 2 года назад

ELSA-2024-2239: skopeo security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2272

почти 2 года назад

ELSA-2024-2272: containernetworking-plugins security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2245

почти 2 года назад

ELSA-2024-2245: buildah security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2193

почти 2 года назад

ELSA-2024-2193: podman security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-0748

около 2 лет назад

ELSA-2024-0748: container-tools:4.0 security update (IMPORTANT)

EPSS: Низкий
rocky логотип

RLSA-2024:0748

11 месяцев назад

Important: container-tools:4.0 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2180

почти 2 года назад

ELSA-2024-2180: runc security update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2024:2988

11 месяцев назад

Moderate: container-tools:rhel8 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2988

почти 2 года назад

ELSA-2024-2988: container-tools:ol8 security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-45287

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-45287

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-45287

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
msrc логотип
CVE-2023-45287

Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel

CVSS3: 7.5
0%
Низкий
7 месяцев назад
debian логотип
CVE-2023-45287

Before Go 1.20, the RSA based TLS key exchanges used the math/big libr ...

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
github логотип
GHSA-33qr-2xwr-95pw

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
oracle-oval логотип
ELSA-2024-2239

ELSA-2024-2239: skopeo security update (MODERATE)

почти 2 года назад
oracle-oval логотип
ELSA-2024-2272

ELSA-2024-2272: containernetworking-plugins security update (MODERATE)

почти 2 года назад
oracle-oval логотип
ELSA-2024-2245

ELSA-2024-2245: buildah security update (MODERATE)

почти 2 года назад
oracle-oval логотип
ELSA-2024-2193

ELSA-2024-2193: podman security update (MODERATE)

почти 2 года назад
oracle-oval логотип
ELSA-2024-0748

ELSA-2024-0748: container-tools:4.0 security update (IMPORTANT)

около 2 лет назад
rocky логотип
RLSA-2024:0748

Important: container-tools:4.0 security update

11 месяцев назад
oracle-oval логотип
ELSA-2024-2180

ELSA-2024-2180: runc security update (MODERATE)

почти 2 года назад
rocky логотип
RLSA-2024:2988

Moderate: container-tools:rhel8 security update

11 месяцев назад
oracle-oval логотип
ELSA-2024-2988

ELSA-2024-2988: container-tools:ol8 security update (MODERATE)

почти 2 года назад

Уязвимостей на страницу