[USN-3199-1] Python Crypto vulnerability

Emily Ratliff emily.ratliff at canonical.com
Fri Feb 17 01:48:56 UTC 2017

Ubuntu Security Notice USN-3199-1
February 16, 2017

Python Crypto vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS


Programs using the Python Cryptography Toolkit could be made to crash or run
programs if they receive specially crafted network traffic or other input.

Software Description:
- python-crypto: cryptographic algorithms and protocols for Python


It was discovered that the ALGnew function in block_templace.c in the Python
Cryptography Toolkit contained a heap-based buffer overflow vulnerability.
A remote attacker could use this flaw to execute arbitrary code by using
a crafted initialization vector parameter.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.10:
  python-crypto                   2.6.1-6ubuntu0.16.10.2
  python3-crypto                  2.6.1-6ubuntu0.16.10.2

Ubuntu 16.04 LTS:
  python-crypto                   2.6.1-6ubuntu0.16.04.1
  python3-crypto                  2.6.1-6ubuntu0.16.04.1

Ubuntu 14.04 LTS:
  python-crypto                   2.6.1-4ubuntu0.1
  python3-crypto                  2.6.1-4ubuntu0.1

In general, a standard system update will make all the necessary changes.


Package Information:
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: This is a digitally signed message part
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20170216/6a5c48cd/attachment.sig>

More information about the ubuntu-security-announce mailing list