跳转到帖子

Red Hat OpenShift: CVE-2023-45287: golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.

recommended_posts

发布于
  • Members

Red Hat OpenShift: CVE-2023-45287: golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:C/I:N/A:N)
Published
12/05/2023
Created
03/01/2024
Added
02/29/2024
Modified
01/28/2025

Description

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

Solution(s)

  • linuxrpm-upgrade-buildah
  • linuxrpm-upgrade-butane
  • linuxrpm-upgrade-containernetworking-plugins
  • linuxrpm-upgrade-microshift
  • linuxrpm-upgrade-openshift
  • linuxrpm-upgrade-openshift-clients
  • linuxrpm-upgrade-podman
  • linuxrpm-upgrade-runc
  • linuxrpm-upgrade-skopeo

References

  • https://attackerkb.com/topics/cve-2023-45287
  • CVE - 2023-45287
  • RHSA-2023:7200
  • RHSA-2023:7201
  • RHSA-2024:0269
  • RHSA-2024:0281
  • RHSA-2024:0748
  • RHSA-2024:1078
  • RHSA-2024:1859
  • RHSA-2024:1901
  • RHSA-2024:2180
  • RHSA-2024:2193
  • RHSA-2024:2239
  • RHSA-2024:2245
  • RHSA-2024:2272
  • RHSA-2024:2729
  • RHSA-2024:2730
  • RHSA-2024:2767
  • RHSA-2024:2988
  • RHSA-2024:3316
  • RHSA-2024:4429
View more
  • 查看数 703
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…