SB2019050924 - Use of insufficiently random values in Go crypto
Published: May 9, 2019 Updated: March 10, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use of insufficiently random values (CVE-ID: CVE-2019-11840)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists in the amd64 implementation of golang.org/x/crypto/salsa20 and golang.org/x/crypto/salsa20/salsa. A remote unauthenticated attacker can trigger the vulnerability and gain access to sensitive information.
Remediation
Install update from vendor's website.
References
- https://groups.google.com/forum/#!msg/golang-announce/tjyNcJxb2vQ/n0NRBziSCAAJ
- https://go.googlesource.com/crypto/+/b7391e95e576cacdcdd422573063bc057239113d
- https://github.com/golang/go/issues/30965
- https://bugzilla.redhat.com/show_bug.cgi?id=1691529
- https://lists.debian.org/debian-lts-announce/2019/06/msg00029.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00014.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00016.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00030.html
- https://lists.debian.org/debian-lts-announce/2021/01/msg00015.html