You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
gentoo-overlay/metadata/glsa/glsa-201702-14.xml

53 lines
1.9 KiB

This file contains ambiguous Unicode characters!

This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201702-14">
<title>PyCrypto: Remote execution of arbitrary code</title>
<synopsis>A heap-based buffer overflow in PyCrypto might allow remote
attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">pycrypto</product>
<announced>2017-02-20</announced>
<revised count="1">2017-02-20</revised>
<bug>576494</bug>
<access>remote</access>
<affected>
<package name="dev-python/pycrypto" auto="yes" arch="*">
<unaffected range="ge">2.6.1-r2</unaffected>
<vulnerable range="lt">2.6.1-r2</vulnerable>
</package>
</affected>
<background>
<p>The Python Cryptography Toolkit (PyCrypto) is a collection of both
secure hash functions (such as SHA256 and RIPEMD160), and various
encryption algorithms (AES, DES, RSA, ElGamal, etc.).
</p>
</background>
<description>
<p>A heap-based buffer overflow vulnerability has been discovered in
PyCrypto. Please review the CVE identifier referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attacker, able to control the mode of operation in PyCryptos
AES module, could possibly execute arbitrary code with the privileges of
the process or cause a Denial of Service condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All PyCrypto users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=dev-python/pycrypto-2.6.1-r2"
</code>
</resolution>
<references>
<uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7459">CVE-2013-7459</uri>
</references>
<metadata tag="requester" timestamp="2017-02-06T00:09:22Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-02-20T23:17:13Z">whissi</metadata>
</glsa>