Hide Forgot
+++ This bug was initially created as a clone of Bug #1371901 +++ Description of problem: A security in python-jwcrypto was found. The jwcrypto implementation of the RSA1_5 algorithm is vulnerable to the Million Message Attack described in RFC 3128. RSA with PKCS1v1.5 is used by Custodia and ipapython.secrets Version-Release number of selected component (if applicable): <= 0.3 Additional info: Upstream bug report: https://github.com/latchset/jwcrypto/pull/66 Upstream fix: https://github.com/latchset/jwcrypto/pull/66
The patch is available upstream https://github.com/latchset/custodia/pull/70
Patch for FreeIPA: https://github.com/freeipa/freeipa/pull/56
# cat /etc/redhat-release Red Hat Enterprise Linux Server release 7.3 Beta (Maipo) # rpm -qi python-jwcrypto Name : python-jwcrypto Version : 0.2.1 Release : 1.el7 Architecture: noarch Install Date: Mon 12 Sep 2016 05:30:24 PM IST Group : Unspecified Size : 166061 License : LGPLv3+ Signature : RSA/SHA256, Thu 28 Jul 2016 12:42:57 PM IST, Key ID 938a80caf21541eb Source RPM : python-jwcrypto-0.2.1-1.el7.src.rpm Build Date : Sat 02 Apr 2016 05:24:19 PM IST Build Host : ppc-021.build.eng.bos.redhat.com Relocations : (not relocatable) Packager : Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla> Vendor : Red Hat, Inc. URL : https://github.com/simo5/jwcrypto Summary : Implements JWK,JWS,JWE specifications using python-cryptography Description : Implements JWK,JWS,JWE specifications using python-cryptography
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHEA-2016-2287.html