Skip to content

PyCrypto does not properly reseed PRNG before allowing access

Moderate severity GitHub Reviewed Published May 17, 2022 to the GitHub Advisory Database • Updated May 2, 2024

Package

pip pycrypto (pip)

Affected versions

< 2.6.1

Patched versions

2.6.1

Description

The Crypto.Random.atfork function in PyCrypto before 2.6.1 does not properly reseed the pseudo-random number generator (PRNG) before allowing a child process to access it, which makes it easier for context-dependent attackers to obtain sensitive information by leveraging a race condition in which a child process is created and accesses the PRNG within the same rate-limit period as another process.

References

Published by the National Vulnerability Database Oct 26, 2013
Published to the GitHub Advisory Database May 17, 2022
Reviewed Apr 22, 2024
Last updated May 2, 2024

Severity

Moderate

EPSS score

0.131%
(49th percentile)

Weaknesses

CVE ID

CVE-2013-1445

GHSA ID

GHSA-x377-f64p-hf5j

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.