[USN-3199-3] Python Crypto vulnerability

Leonidas S. Barbosa leo.barbosa at canonical.com
Mon Aug 28 14:39:43 UTC 2017


==========================================================================
Ubuntu Security Notice USN-3199-3
August 28, 2017

python-crypto vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 ESM

Summary:

Programs using the Python Cryptography Toolkit could be made to
crash or run programs if they receive specially crafted network
traffic or other input.

Software Description:
- python-crypto: cryptographic algorithms and protocols for Python

Details:

USN-3199-1 fixed a vulnerability in Python Crypto. This update
provides the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

 It was discovered that the ALGnew function in block_templace.c in the
 Python Cryptography Toolkit contained a heap-based buffer overflow
 vulnerability. A remote attacker could use this flaw to execute
 arbitrary code by using a crafted initialization vector parameter.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
  python-crypto                   2.4.1-1ubuntu0.2
  python3-crypto                  2.4.1-1ubuntu0.2

In general, a standard system update will make all the necessary
changes.

References:
  https://www.ubuntu.com/usn/usn-3199-3
  https://www.ubuntu.com/usn/usn-3199-1
  CVE-2013-7459
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: This is a digitally signed message part
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20170828/f78535dd/attachment.pgp>


More information about the ubuntu-security-announce mailing list