| Summary: | python-rsa new security issue CVE-2016-1494 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, geiger.david68210, sysadmin-bugs, tarazed25 |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/671636/ | ||
| Whiteboard: | MGA5-64-OK MGA5-32-OK advisory | ||
| Source RPM: | python-rsa-3.1.4-6.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2016-01-05 17:13:49 CET
David Walser
2016-01-05 17:14:23 CET
CC:
(none) =>
geiger.david68210 security issue fixed now for Cauldron and mga5 too!! :) Thanks David! This is the QA team's first 2016 CVE. Enjoy. Advisory: ======================== Updated python-rsa packages fix security vulnerability: A signature forgery vulnerability in python-rsa allows an attacker to fake signatures for arbitrary messages for any key with a low exponent "e", such as the common value of 3 (CVE-2016-1494). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1494 https://blog.filippo.io/bleichenbacher-06-signature-forgery-in-python-rsa/ http://openwall.com/lists/oss-security/2016/01/05/3 ======================== Updated packages in core/updates_testing: ======================== python-rsa-3.1.4-6.1.mga5 python3-rsa-3.1.4-6.1.mga5 from python-rsa-3.1.4-6.1.mga5.src.rpm Assignee:
mageia =>
qa-bugs mga5 x86_64 Mate Had to read up on the use of RSA encryption and found some useful links but could not fully understand the mathematics involved. Wikipedia is a good start. This little script is a very basic test of RSA in python. It runs fine both before and after the update. #!/bin/env python # Primitive Alice and Bob scenario using python-rsa # reference: https://stuvel.eu/files/python-rsa-doc/usage.html#generating-keys import rsa # Jim generates a keypair and gives Suzy the public key by some means. # The poolsize parameter allows the calculation to be speeded up if more than # one core is available. Leave it out if speed is not an issue. (publickey, privatekey) = rsa.newkeys( 512, poolsize=8 ) # Suzy composes message as an encoded byte-string and encrypts it. message = "Tonight's the night".encode( 'utf8' ) print( message ) print( "-------------------" ) crypted = rsa.encrypt( message, publickey ) print( crypted ) # ... Suzy sends message ... # ... Jim receives it and decodes it ... received = rsa.decrypt( crypted, privatekey ) print( received.decode( 'utf8' ) ) exit( ) CC:
(none) =>
tarazed25
Len Lawrence
2016-01-11 23:14:30 CET
Whiteboard:
(none) =>
MGA5-64-OK mga5 i586 VM Mate Used the script from comment #3 to test RSA encryption/decryption. Leaving validation to allow time for objections.
Len Lawrence
2016-01-11 23:34:16 CET
Whiteboard:
MGA5-64-OK =>
MGA5-64-OK MGA5-32-OK
Dave Hodgins
2016-01-12 07:35:54 CET
Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2016-0011.html Status:
NEW =>
RESOLVED
David Walser
2016-01-12 21:42:58 CET
URL:
(none) =>
http://lwn.net/Vulnerabilities/671636/ |