CVE-2019-19794: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.
References
- github.com/advisories/GHSA-44r7-7p62-q3fr
- github.com/coredns/coredns/issues/3519
- github.com/coredns/coredns/issues/3547
- github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33
- github.com/miekg/dns/compare/v1.1.24...v1.1.25
- github.com/miekg/dns/issues/1043
- github.com/miekg/dns/pull/1044
- nvd.nist.gov/vuln/detail/CVE-2019-19794
Detect and mitigate CVE-2019-19794 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →