Home / mailingsPDF  

[USN-3199-2] Python Crypto regression

Posted on 17 February 2017
Ubuntu Security

==========================
==========================
========================
Ubuntu Security Notice USN-3199-2
February 17, 2017

Python Crypto regression
==========================
==========================
========================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

USN-3199-1 introduced a regression in the Python Cryptography Toolkit which
caused programs which relied on the original behavior to fail.

Software Description:
- python-crypto: cryptographic algorithms and protocols for Python

Details:

USN-3199-1 fixed a vulnerability in the Python Cryptography Toolkit.
Unfortunately, various programs depended on the original behavior of the Py=
thon
Cryptography Toolkit which was altered when fixing the vulnerability. This
update retains the fix for the vulnerability but issues a warning rather th=
an
throwing an exception. Code which produces this warning should be updated
because future versions of the Python Cryptography Toolkit re-introduce the
exception.

We apologize for the inconvenience.

Original advisory details:

=C2=A0It was discovered that the ALGnew function in block_template.c in the=
Python
=C2=A0Cryptography Toolkit contained a heap-based buffer overflow vulnerabi=
lity.
=C2=A0A remote attacker could use this flaw to execute arbitrary code by us=
ing
=C2=A0a crafted initialization vector parameter.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.10:
=C2=A0 python-crypto=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.6.1-6ubuntu0.=
16.10.3
=C2=A0 python3-crypto=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.6.1-6ubuntu0.16.10.=
3

Ubuntu 16.04 LTS:
=C2=A0 python-crypto=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.6.1-6ubuntu0.=
16.04.2
=C2=A0 python3-crypto=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.6.1-6ubuntu0.16.04.=
2

Ubuntu 14.04 LTS:
=C2=A0 python-crypto=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.6.1-4ubuntu0.=
2
=C2=A0 python3-crypto=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.6.1-4ubuntu0.2

In general, a standard system update will make all the necessary changes.

References:
=C2=A0 http://www.ubuntu.com/usn/usn-3199-2
=C2=A0 http://www.ubuntu.com/usn/usn-3199-1
=C2=A0 CVE-2013-7459

Package Information:
=C2=A0 https://launchpad.net/ubuntu/+source/python-crypto/2.6.1-6ubuntu0.16=
.10.3
=C2=A0 https://launchpad.net/ubuntu/+source/python-crypto/2.6.1-6ubuntu0.16=
.04.2
=C2=A0 https://launchpad.net/ubuntu/+source/python-crypto/2.6.1-4ubuntu0.2

 

TOP