Ubuntu Security Notice 3199-1 - It was discovered that the ALGnew function in block_templace.c in the Python Cryptography Toolkit contained a heap-based buffer overflow vulnerability. A remote attacker could use this flaw to execute arbitrary code by using a crafted initialization vector parameter.
e8a7c38d5847c9eb619e356107017e6f6145e41512cc339e081a0c3d1ef48e20
===========================================================================
Ubuntu Security Notice USN-3199-1
February 16, 2017
Python Crypto vulnerability
===========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Programs using the Python Cryptography Toolkit could be made to crash or run
programs if they receive specially crafted network traffic or other input.
Software Description:
- python-crypto: cryptographic algorithms and protocols for Python
Details:
It was discovered that the ALGnew function in block_templace.c in the Python
Cryptography Toolkit contained a heap-based buffer overflow vulnerability.
A remote attacker could use this flaw to execute arbitrary code by using
a crafted initialization vector parameter.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.10:
=C2=A0 python-crypto=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.6.1-6ubuntu0.16.10.2
=C2=A0 python3-crypto=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.6.1-6ubuntu0.16.10.2
Ubuntu 16.04 LTS:
=C2=A0 python-crypto=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.6.1-6ubuntu0.16.04.1
=C2=A0 python3-crypto=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.6.1-6ubuntu0.16.04.1
Ubuntu 14.04 LTS:
=C2=A0 python-crypto=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.6.1-4ubuntu0.1
=C2=A0 python3-crypto=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.6.1-4ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
=C2=A0 http://www.ubuntu.com/usn/usn-3199-1
=C2=A0 CVE-2013-7459
Package Information:
=C2=A0 https://launchpad.net/ubuntu/+source/python-crypto/2.6.1-6ubuntu0.16.10.2
=C2=A0 https://launchpad.net/ubuntu/+source/python-crypto/2.6.1-6ubuntu0.16.04.1
=C2=A0 https://launchpad.net/ubuntu/+source/python-crypto/2.6.1-4ubuntu0.1