Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Improper random reading in CIRCL
Vulnerability Description
When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret. The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.
CVSS Information
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N
Vulnerability Type
输入验证不恰当
Vulnerability Title
CIRCL 安全漏洞
Vulnerability Description
CIRCL是Cloudflare开源的一个用 Go 编写的加密原语集合。 CIRCL 存在安全漏洞,该漏洞源于 tkn20 和 blindrsa 组件不检查用户提供的随机源是否返回了足够的随机性。
CVSS Information
N/A
Vulnerability Type
N/A