Description
Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Tue, 17 Jun 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat stf
|
|
| CPEs | cpe:/a:redhat:stf:1.5::el8 | |
| Vendors & Products |
Redhat service Telemetry Framework
|
Redhat stf
|
Subscriptions
Golang
Subscribe
Go
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Migration Toolkit Applications
Subscribe
Openshift
Subscribe
Openshift Api Data Protection
Subscribe
Openshift Secondary Scheduler
Subscribe
Openstack
Subscribe
Rhel Eus
Subscribe
Run Once Duration Override Operator
Subscribe
Service Interconnect
Subscribe
Stf
Subscribe
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2025-02-13T17:14:00.588Z
Reserved: 2023-10-06T17:06:26.221Z
Link: CVE-2023-45287
No data.
Status : Modified
Published: 2023-12-05T17:15:08.570
Modified: 2024-11-21T08:26:42.250
Link: CVE-2023-45287
OpenCVE Enrichment
No data.