FEDORA-EPEL-2017-8cb1dcd776 created by pghmcfc 3 years ago for Fedora EPEL 7
stable

A heap-buffer overflow vulnerability was discovered in pycrypto leading to arbitrary code execution. All users of pycrypto's AES module that allow the mode of operation to be specified by an attacker, check for ECB explicitly and create the objects without specifying an IV are vulnerable to this issue.

This is CVE-2013-7459.

This update has been submitted for testing by pghmcfc.

3 years ago

This update has been pushed to testing.

3 years ago

This update has been submitted for stable by pghmcfc.

2 years ago

This update has been pushed to stable.

2 years ago
User Icon ngoldin commented & provided feedback 2 years ago
karma

Hi, this breaks package python-paramiko on EPEL, see: https://bugzilla.redhat.com/show_bug.cgi?id=1419312

A possible (nice) solution - as was done in fc24, is to build and provide python-paramiko2.x in EPEL, which does not depend on python2-crypto(instead it depends on python2-cryptography, which is supposed to be more secure and maintained).

User Icon pghmcfc commented & provided feedback 2 years ago

The issue is fixed in python-paramiko-1.16.1-2.el7, which is currently in updates-testing.


Please login to add feedback.

Metadata
Type
security
Severity
high
Karma
-1
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-1
Dates
submitted
3 years ago
in testing
3 years ago
in stable
2 years ago
BZ#1409754 CVE-2013-7459 pycrypto: Heap-buffer overflow in ALGobject structure
0
0

Automated Test Results