python3Packages.cryptography: 3.1.1 -> 3.2 (security, CVE-2020-25659)#101751
python3Packages.cryptography: 3.1.1 -> 3.2 (security, CVE-2020-25659)#101751primeos merged 1 commit intoNixOS:stagingfrom
Conversation
SECURITY ISSUE: Attempted to make RSA PKCS#1v1.5 decryption more constant time, to protect against Bleichenbacher vulnerabilities. Due to limitations imposed by our API, we cannot completely mitigate this vulnerability and a future release will contain a new API which is designed to be resilient to these for contexts where it is required. Credit to Hubert Kario for reporting the issue. CVE-2020-25659
|
We also have a 2.9 version, should we apply the same patch there? Is that version now considered "insecure"? The CVE description says everything |
Yeah, I think we should try to apply pyca/cryptography@58494b4, the tests should hopefully cover that code path. Personally I'd like to mark it as insecure, but I don't think we should given that there are probably still a lot of legacy Python 2 packages around that depend on it :o
AFAIK, yes. When I opened the PR the CVE details weren't available, but now it seems pretty clear. Though I'm not sure if / how many Python packages are really affected by this (and how practical the attack is for them). (But I don't mean that we should just ignore it.) |
SECURITY ISSUE: Attempted to make RSA PKCS#1v1.5 decryption more
constant time, to protect against Bleichenbacher vulnerabilities. Due to
limitations imposed by our API, we cannot completely mitigate this
vulnerability and a future release will contain a new API which is
designed to be resilient to these for contexts where it is required.
Credit to Hubert Kario for reporting the issue. CVE-2020-25659
Motivation for this change
Things done
sandboxinnix.confon non-NixOS linux)nix-shell -p nixpkgs-review --run "nixpkgs-review wip"./result/bin/)nix path-info -Sbefore and after)