Bug 880279
Summary: | plexus-cipher: improper use of SecureRandom in PBECipher | ||||||
---|---|---|---|---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Florian Weimer <fweimer> | ||||
Component: | plexus-cipher | Assignee: | Mikolaj Izdebski <mizdebsk> | ||||
Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | ||||
Severity: | unspecified | Docs Contact: | |||||
Priority: | unspecified | ||||||
Version: | 18 | CC: | huwang, jcapik, mizdebsk | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | Unspecified | ||||||
OS: | Unspecified | ||||||
Whiteboard: | |||||||
Fixed In Version: | 1.5-11 | Doc Type: | Bug Fix | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | |||||||
: | 880673 (view as bug list) | Environment: | |||||
Last Closed: | 2012-12-06 06:59:53 UTC | Type: | Bug | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | |||||||
Bug Blocks: | 880257, 880673 | ||||||
Attachments: |
|
Description
Florian Weimer
2012-11-26 15:50:27 UTC
Created attachment 652787 [details]
Proposed patch
I have replaced multiple generator objects with a single static SecureRandom which relies on Java to properly seed it. I removed OS detection as the new code should work properly on all OSes supported by Java. There should be no problems because of API/ABI changes. SecureRandom#nextBytes(byte[]) is thread safe.
Does this patch satisfy you?
(In reply to comment #1) > Created attachment 652787 [details] > Proposed patch > > I have replaced multiple generator objects with a single static SecureRandom > which relies on Java to properly seed it. I removed OS detection as the new > code should work properly on all OSes supported by Java. There should be no > problems because of API/ABI changes. SecureRandom#nextBytes(byte[]) is > thread safe. > > Does this patch satisfy you? Looks good, thanks. Fixed in plexus-cipher-1.5-11 plexus-cipher-1.5-11.fc16 has been submitted as an update for Fedora 16. https://admin.fedoraproject.org/updates/plexus-cipher-1.5-11.fc16 plexus-cipher-1.5-11.fc17 has been submitted as an update for Fedora 17. https://admin.fedoraproject.org/updates/plexus-cipher-1.5-11.fc17 plexus-cipher-1.5-11.fc18 has been submitted as an update for Fedora 18. https://admin.fedoraproject.org/updates/plexus-cipher-1.5-11.fc18 Package plexus-cipher-1.5-11.fc18: * should fix your issue, * was pushed to the Fedora 18 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing plexus-cipher-1.5-11.fc18' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2012-19162/plexus-cipher-1.5-11.fc18 then log in and leave karma (feedback). plexus-cipher-1.5-11.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report. plexus-cipher-1.5-11.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report. plexus-cipher-1.5-11.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report. |