Ubuntu 3199-3: Python Crypto vulnerability

    Date28 Aug 2017
    CategoryUbuntu
    50
    Posted ByLinuxSecurity Advisories
    Programs using the Python Cryptography Toolkit could be made to crash or run programs if they receive specially crafted network traffic or other input.
    ==========================================================================
    Ubuntu Security Notice USN-3199-3
    August 28, 2017
    
    python-crypto vulnerability
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 12.04 ESM
    
    Summary:
    
    Programs using the Python Cryptography Toolkit could be made to
    crash or run programs if they receive specially crafted network
    traffic or other input.
    
    Software Description:
    - python-crypto: cryptographic algorithms and protocols for Python
    
    Details:
    
    USN-3199-1 fixed a vulnerability in Python Crypto. This update
    provides the corresponding update for Ubuntu 12.04 ESM.
    
    Original advisory details:
    
     It was discovered that the ALGnew function in block_templace.c in the
     Python Cryptography Toolkit contained a heap-based buffer overflow
     vulnerability. A remote attacker could use this flaw to execute
     arbitrary code by using a crafted initialization vector parameter.
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 12.04 ESM:
      python-crypto                   2.4.1-1ubuntu0.2
      python3-crypto                  2.4.1-1ubuntu0.2
    
    In general, a standard system update will make all the necessary
    changes.
    
    References:
      https://www.ubuntu.com/usn/usn-3199-3
      https://www.ubuntu.com/usn/usn-3199-1
      CVE-2013-7459
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"23","type":"x","order":"1","pct":56.1,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.2,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":31.71,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.