CVE-2013-1445

Priority
Description
The Crypto.Random.atfork function in PyCrypto before 2.6.1 does not
properly reseed the pseudo-random number generator (PRNG) before allowing a
child process to access it, which makes it easier for context-dependent
attackers to obtain sensitive information by leveraging a race condition in
which a child process is created and accesses the PRNG within the same
rate-limit period as another process.
Package
Upstream:released (2.6.1-1, 2.6-4+deb7u3, 2.1.0-2+squeeze2)
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 LTS (Trusty Tahr):not-affected
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Ubuntu 18.04 LTS (Bionic Beaver):not-affected
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected
Ubuntu 19.04 (Disco Dingo):not-affected
Patches:
Upstream:http://www.openwall.com/lists/oss-security/2013/10/17/3
More Information

Updated: 2019-01-14 21:14:49 UTC (commit 51f9b73af244ba86b9321e46e526586c25a8e060)