Bug 246760 (CVE-2007-3528)

Summary: CVE-2007-3528 dar Blowfish-CBC weakness
Product: [Fedora] Fedora Reporter: Ville Skyttä <ville.skytta>
Component: darAssignee: Chris Petersen <lists>
Status: CLOSED ERRATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: low Docs Contact:
Priority: low    
Version: 7CC: fedora-security-list
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: 2.3.4-1.fc7 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-07-05 19:24:45 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Ville Skyttä 2007-07-04 17:15:30 UTC
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3528

"The blowfish mode in DAR before 2.3.4 uses weak Blowfish-CBC cryptography by
(1) discarding random bits by the blowfish::make_ivec function in
libdar/crypto.cpp that results in predictable and repeating IV values, and (2)
direct use of a password for keying, which makes it easier for context-dependent
attackers to decrypt files."

2.3.4 is in CVS for F-7+, FC-6 appears untreated at the moment.

Please mark the F-7 update as a security one in the updates system and add the
CVE reference to it (I have no permissions to do that).

Comment 1 Chris Petersen 2007-07-04 17:41:19 UTC
Updated in bodhi, should roll out asap.  Also updated FC-6 and Epel.  This bug
should auto-close when F-7 rolls out.

Comment 2 Fedora Update System 2007-07-05 19:24:42 UTC
dar-2.3.4-1.fc7 has been pushed to the Fedora 7 stable repository.  If problems still persist, please make note of it in this bug report.