|Category:||Debian Local Security Checks|
|Title:||Debian LTS: Security Advisory for obfs4proxy (DLA-2442-1)|
|Summary:||The remote host is missing an update for the 'obfs4proxy'; package(s) announced via the DLA-2442-1 advisory.|
The remote host is missing an update for the 'obfs4proxy'
package(s) announced via the DLA-2442-1 advisory.
golang-go.crypto was recently updated with a fix for CVE-2019-11840. This in
turn requires all packages that use the affected code to be recompiled in order
to pick up the security fix.
An issue was discovered in supplementary Go cryptography libraries, aka
golang-googlecode-go-crypto. If more than 256 GiB of keystream is
generated, or if the counter otherwise grows greater than 32 bits, the amd64
implementation will first generate incorrect output, and then cycle back to
previously generated keystream. Repeated keystream bytes can lead to loss of
confidentiality in encryption applications, or to predictability in CSPRNG
'obfs4proxy' package(s) on Debian Linux.
For Debian 9 stretch, this problem has been fixed in version 0.0.7-1+deb8u1.
We recommend that you upgrade your obfs4proxy packages.
Common Vulnerability Exposure (CVE) ID: CVE-2019-11840|
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.