-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3946
                        obfs4proxy security update
                             10 November 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           obfs4proxy
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Access Confidential Data -- Remote/Unauthenticated
                   Reduced Security         -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-11840  

Reference:         ESB-2020.3473
                   ESB-2019.2367

Original Bulletin: 
   https://www.debian.org/lts/security/2020/dla-2442

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-2442-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                            Brian May
November 10, 2020                             https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : obfs4proxy
Version        : 0.0.7-1+deb8u1
CVE ID         : CVE-2019-11840

golang-go.crypto was recently updated with a fix for CVE-2019-11840. This in
turn requires all packages that use the affected code to be recompiled in order
to pick up the security fix.

CVE-2019-11840

    An issue was discovered in supplementary Go cryptography libraries, aka
    golang-googlecode-go-crypto. If more than 256 GiB of keystream is
    generated, or if the counter otherwise grows greater than 32 bits, the amd64
    implementation will first generate incorrect output, and then cycle back to
    previously generated keystream. Repeated keystream bytes can lead to loss of
    confidentiality in encryption applications, or to predictability in CSPRNG
    applications.

For Debian 9 stretch, this problem has been fixed in version3
0.0.7-1+deb8u1.

We recommend that you upgrade your obfs4proxy packages.

For the detailed security status of obfs4proxy please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/obfs4proxy

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=9AtJ
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=eD92
-----END PGP SIGNATURE-----