|Category:||Debian Local Security Checks|
|Title:||Debian LTS: Security Advisory for golang-go.crypto (DLA-2402-1)|
|Summary:||The remote host is missing an update for the 'golang-go.crypto'; package(s) announced via the DLA-2402-1 advisory.|
The remote host is missing an update for the 'golang-go.crypto'
package(s) announced via the DLA-2402-1 advisory.
An issue was discovered in supplementary Go cryptography libraries, aka
golang-googlecode-go-crypto. If more than 256 GiB of keystream is
generated, or if the counter otherwise grows greater than 32 bits, the amd64
implementation will first generate incorrect output, and then cycle back to
previously generated keystream. Repeated keystream bytes can lead to loss of
confidentiality in encryption applications, or to predictability in CSPRNG
A message-forgery issue was discovered in
crypto/openpgp/clearsign/clearsign.go in supplementary Go cryptography
libraries. The 'Hash' Armor Header specifies the message digest
algorithm(s) used for the signature. Since the library skips Armor Header
parsing in general, an attacker can not only embed arbitrary Armor Headers,
but also prepend arbitrary text to cleartext messages without invalidating
golang.org/x/crypto allows a panic during signature verification in the
golang.org/x/crypto/ssh package. A client can attack an SSH server that accepts
public keys. Also, a server can attack any SSH client.
'golang-go.crypto' package(s) on Debian Linux.
For Debian 9 stretch, these problems have been fixed in version
We recommend that you upgrade your golang-go.crypto packages.
Common Vulnerability Exposure (CVE) ID: CVE-2020-9283|
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.