| Summary: | python-pycrypto - PRNG not correctly reseeded in some situations (CVE-2013-1445) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Oden Eriksson <oe> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | balaton, rwobben, sysadmin-bugs, tmb |
| Version: | 3 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/571138/ | ||
| Whiteboard: | MGA2TOO MGA3-64-OK MGA3-32-OK MGA2-64-OK MGA2-32-OK | ||
| Source RPM: | python-pycrypto | CVE: | |
| Status comment: | |||
|
Description
Oden Eriksson
2013-10-18 09:17:10 CEST
python-pycrypto-2.3-2.2.mga2 and python-pycrypto-2.6-2.1.mga3 has been submitted where this is fixed. python-pycrypto-2.6.1 has been committed to cauldron, needs someone to submit it. Thanks Oden. Thomas submitted it for Cauldron. Advisory: ======================== Updated python-pycrypto package fixes security vulnerability: In PyCrypto before v2.6.1, the Crypto.Random pseudo-random number generator (PRNG) exhibits a race condition that may cause it to generate the same 'random' output in multiple processes that are forked from each other. Depending on the application, this could reveal sensitive information or cryptographic keys to remote attackers (CVE-2013-1445). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1445 http://lists.dlitz.net/pipermail/pycrypto/2013q4/000702.html ======================== Updated packages in core/updates_testing: ======================== python-pycrypto-2.3-2.2.mga2 python-pycrypto-2.6-2.1.mga3 from SRPMS: python-pycrypto-2.3-2.2.mga2.src.rpm python-pycrypto-2.6-2.1.mga3.src.rpm Version:
2 =>
3 I can confirm the bug but cannot test the update because I work on M3 and it cannot found the new package. Roelof CC:
(none) =>
rwobben Found it. Before it shows 4 times the same key. After installing the new package , I see this output : [u'0a7273a36885218f,9b0fa767674f6ffe', u'3ea61dd74843e3eb,87e2fa2a2e8b8ce4', u'8a6a332f7c575185,f66ee10f3f69ac4b', u'a4a551023b1a79bf,424a2fd40a84a3fd'] So for me M3 x86_64 Oke. Roelof Whiteboard:
MGA2TOO =>
MGA2TOO M3 x86_64 ok
David Walser
2013-10-19 17:29:10 CEST
Whiteboard:
MGA2TOO M3 x86_64 ok =>
MGA2TOO MGA3-64-OK Tested on M3 32 bit on Virtualbox and it's oke. Roelof Whiteboard:
MGA2TOO MGA3-64-OK =>
MGA2TOO MGA3-64-OK MGA3-32-OK Debian has issued an advisory for this on October 18: http://www.debian.org/security/2013/dsa-2781 URL:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1445 =>
http://lwn.net/Vulnerabilities/571138/ Tested on mga2 x86_64 installing python-pycrypto-2.3-2.1.mga2.x86_64.rpm from /var/cache/urpmi/rpms $ python testpycrypt.py [u'0451a503cf21b8a6,0dbb34d8ba5acc47', u'0451a503cf21b8a6,25d75cf3e63022ef', u'0451a503cf21b8a6,3d10502e4eff4202', u'0451a503cf21b8a6,a21c2ceba5e904da'] installing python-pycrypto-2.3-2.2.mga2.x86_64.rpm from /var/cache/urpmi/rpms $ python testpycrypt.py [u'309918ec4b4bc9d4,c16d5acca6d14fb4', u'8f0031c20eaf0e53,62e24d7442e25bf0', u'c665173390bd2057,91e31804caddcac1', u'd73d79849b9b3dc1,a1da431af14673d1'] CC:
(none) =>
balaton Tested on mga2 i586 with python-pycrypto-2.3-2.1.mga2 $ python testpycrypt.py [u'12c2c82f78ebc991,32c121228f5f2719', u'61ed9476d0548c5d,b67b9204af623dc8', u'8eb9fdf4bb535966,e8261a70d322bbda', u'e1feb326ced6fc8c,13554f85b6ec5556'] with python-pycrypto-2.3-2.2.mga2 $ python testpycrypt.py [u'133d7b007cf6d18f,6971a564092c1c19', u'6623426de4b263c9,5b932662229966d3', u'ede1e88ac06fe5c8,6b2d745a5073ac57', u'f7603c3f06ce425a,3f092973fd159610'] (seems to be OK even without the updated package but also after the update) Could someone please do the validation procedure based on the testing results above? Whiteboard:
MGA2TOO MGA3-64-OK MGA3-32-OK MGA2-64-OK =>
MGA2TOO MGA3-64-OK MGA3-32-OK MGA2-64-OK MGA2-32-OK Advisory uploaded. Validating. Could sysadmin please push from 2&3 core/updates_testing to updates Thanks! Keywords:
(none) =>
validated_update Update pushed: http://advisories.mageia.org/MGASA-2013-0319.html Status:
NEW =>
RESOLVED |