Bug 1311438 (CVE-2016-2513)
| Summary: | CVE-2016-2513 python-django: User enumeration through timing difference on password hasher work factor upgrade | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> | ||||||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||||
| Status: | CLOSED ERRATA | QA Contact: | |||||||||
| Severity: | medium | Docs Contact: | |||||||||
| Priority: | medium | ||||||||||
| Version: | unspecified | CC: | abaron, aortega, apevec, ayoung, bkearney, cbillett, chrisw, dallan, gkotton, jjoyce, jschluet, kbasil, kseifried, lars, lhh, lpeer, markmc, mburns, mrunge, rbryant, sclewis, security-response-team, sisharma, slinaber, slong, tdecacqu, tomckay, yeylon | ||||||||
| Target Milestone: | --- | Keywords: | Security | ||||||||
| Target Release: | --- | ||||||||||
| Hardware: | All | ||||||||||
| OS: | Linux | ||||||||||
| Whiteboard: | |||||||||||
| Fixed In Version: | python-django 1.8.10, python-django 1.9.3 | Doc Type: | Bug Fix | ||||||||
| Doc Text: |
A timing attack flaw was found in the way Django's PBKDF2PasswordHasher performed password hashing. Passwords hashed with an older version of PBKDF2PasswordHasher used less hashing iterations, and thus allowed an attacker to enumerate existing users based on the time differences in the login requests.
|
Story Points: | --- | ||||||||
| Clone Of: | Environment: | ||||||||||
| Last Closed: | 2016-04-08 05:48:39 UTC | Type: | --- | ||||||||
| Regression: | --- | Mount Type: | --- | ||||||||
| Documentation: | --- | CRM: | |||||||||
| Verified Versions: | Category: | --- | |||||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||||
| Embargoed: | |||||||||||
| Bug Depends On: | 1314827, 1314828, 1314830, 1314831, 1314832, 1315210, 1315212, 1315214, 1315215, 1315216, 1315219, 1315220 | ||||||||||
| Bug Blocks: | 1311442 | ||||||||||
| Attachments: |
|
||||||||||
|
Description
Adam Mariš
2016-02-24 09:25:17 UTC
Created attachment 1130107 [details]
Upstream patch 1.8.x
Created attachment 1130109 [details]
Upstream patch 1.9.x
Created attachment 1130111 [details]
Upstream patch master
External Reference: https://www.djangoproject.com/weblog/2016/mar/01/security-releases/ Created Django14 tracking bugs for this issue: Affects: epel-6 [bug 1314830] Created python-django15 tracking bugs for this issue: Affects: epel-6 [bug 1314831] Created python-django tracking bugs for this issue: Affects: fedora-all [bug 1314828] Affects: epel-7 [bug 1314832] Acknowledgments: Name: the Django project python-django-1.8.11-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report. python-django-1.8.11-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in the following products: Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7 Via RHSA-2016:0506 https://rhn.redhat.com/errata/RHSA-2016-0506.html This issue has been addressed in the following products: Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 Via RHSA-2016:0505 https://rhn.redhat.com/errata/RHSA-2016-0505.html This issue has been addressed in the following products: Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 Via RHSA-2016:0504 https://rhn.redhat.com/errata/RHSA-2016-0504.html This issue has been addressed in the following products: Red Hat Enterprise Linux OpenStack Platform 7.0 Operational Tools for RHEL 7 Via RHSA-2016:0503 https://rhn.redhat.com/errata/RHSA-2016-0503.html This issue has been addressed in the following products: Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6 Via RHSA-2016:0502 https://rhn.redhat.com/errata/RHSA-2016-0502.html |