Bug 833045 (CVE-2012-2742, CVE-2012-2743)
Summary: | CVE-2012-2742 CVE-2012-2743 revelation: Limits effective password length to 32 characters and doesn't iterate the passphrase through SHA algorithm to derive the encryption key | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | extras-orphan, i.grok, jspaleta, pingou |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-08-22 15:24:56 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 833049, 833050 | ||
Bug Blocks: |
Description
Jan Lieskovsky
2012-06-18 13:22:52 UTC
CVE Request: [6] http://www.openwall.com/lists/oss-security/2012/06/18/1 Created revelation tracking bugs for this issue Affects: fedora-all [bug 833049] Affects: epel-5 [bug 833050] The following two CVE identifiers have been assigned: http://www.openwall.com/lists/oss-security/2012/06/18/3 to the issues in question as follows: 1) CVE-2012-2742 one for the: "Revelation: Limits effective password length to 32 characters" issue, 2) CVE-2012-2743 one for the: "Revelation: Doesn't iterate the passphrase through SHA algorithm" issue. Jan, Looks like the commits that are suppose to fix this landed about 5 hours ago in the upstream tree. Upstream is prepping a release for tomorrow. I'll push a new updates-testing package out into F16 and F17 as soon after upstream has the release out as I can. -jef initial scratch build against rawhide with the upstream encryption subsystem patches. http://koji.fedoraproject.org/koji/taskinfo?taskID=4191839 (In reply to comment #4) > Jan, > > Looks like the commits that are suppose to fix this landed about 5 hours ago > in the upstream tree. Upstream is prepping a release for tomorrow. I'll > push a new updates-testing package out into F16 and F17 as soon after > upstream has the release out as I can. > > -jef Brilliant. Thank you for that, Jef. It's been almost a month, I've seen no activity on this bug... Sorry this bug wasn't linked to the update packages. packages are in updates-testing for F16 and F17. Packages are in rawhide. There is a lingering issue which gconf schema changes that causes the new revelation to not work correctly without manual intervention to delete the .gconf configs for revelation and restarting the user session. I haven't been able to nail down a complete fix for that and I can't get it to happen consistently on my test F16 and F17 machines. So the packages are lingering in updates-testing. -jef |