Home / mailings [USN-3199-1] Python Crypto vulnerability
Posted on 17 February 2017
Ubuntu Security==========================
==========================
========================
Ubuntu Security Notice USN-3199-1
February 16, 2017
Python Crypto vulnerability
==========================
==========================
========================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Programs using the Python Cryptography Toolkit could be made to crash or ru=
n
programs if they receive specially crafted network traffic or other input.
Software Description:
- python-crypto: cryptographic algorithms and protocols for Python
Details:
It was discovered that the ALGnew function in block_templace.c in the Pytho=
n
Cryptography Toolkit contained a heap-based buffer overflow vulnerability.
A remote attacker could use this flaw to execute arbitrary code by using
a crafted initialization vector parameter.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.10:
=C2=A0 python-crypto=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.6.1-6ubuntu0.=
16.10.2
=C2=A0 python3-crypto=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.6.1-6ubuntu0.16.10.=
2
Ubuntu 16.04 LTS:
=C2=A0 python-crypto=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.6.1-6ubuntu0.=
16.04.1
=C2=A0 python3-crypto=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.6.1-6ubuntu0.16.04.=
1
Ubuntu 14.04 LTS:
=C2=A0 python-crypto=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.6.1-4ubuntu0.=
1
=C2=A0 python3-crypto=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.6.1-4ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
=C2=A0 http://www.ubuntu.com/usn/usn-3199-1
=C2=A0 CVE-2013-7459
Package Information:
=C2=A0 https://launchpad.net/ubuntu/+source/python-crypto/2.6.1-6ubuntu0.16=
.10.2
=C2=A0 https://launchpad.net/ubuntu/+source/python-crypto/2.6.1-6ubuntu0.16=
.04.1
=C2=A0 https://launchpad.net/ubuntu/+source/python-crypto/2.6.1-4ubuntu0.1