First published: Sat Oct 26 2013(Updated: )
The Crypto.Random.atfork function in PyCrypto before 2.6.1 does not properly reseed the pseudo-random number generator (PRNG) before allowing a child process to access it, which makes it easier for context-dependent attackers to obtain sensitive information by leveraging a race condition in which a child process is created and accesses the PRNG within the same rate-limit period as another process.
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlitz Pycrypto | <=2.6 | |
Dlitz Pycrypto | =1.0.0 | |
Dlitz Pycrypto | =1.0.1 | |
Dlitz Pycrypto | =1.0.2 | |
Dlitz Pycrypto | =2.0 | |
Dlitz Pycrypto | =2.0.1 | |
Dlitz Pycrypto | =2.1.0 | |
Dlitz Pycrypto | =2.2 | |
Dlitz Pycrypto | =2.3 | |
Dlitz Pycrypto | =2.4 | |
Dlitz Pycrypto | =2.4.1 | |
Dlitz Pycrypto | =2.5 | |
pip/pycrypto | <2.6.1 | 2.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.