漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Improper random reading in CIRCL
Vulnerability Description
When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret. The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.
CVSS Information
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N
Vulnerability Type
输入验证不恰当
Vulnerability Title
CIRCL 安全漏洞
Vulnerability Description
CIRCL是Cloudflare开源的一个用 Go 编写的加密原语集合。 CIRCL 存在安全漏洞,该漏洞源于 tkn20 和 blindrsa 组件不检查用户提供的随机源是否返回了足够的随机性。
CVSS Information
N/A
Vulnerability Type
N/A