PyCrypto does not properly reseed PRNG before allowing access
High severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Oct 21, 2024
Description
Published by the National Vulnerability Database
Oct 26, 2013
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
Apr 22, 2024
Last updated
Oct 21, 2024
The Crypto.Random.atfork function in PyCrypto before 2.6.1 does not properly reseed the pseudo-random number generator (PRNG) before allowing a child process to access it, which makes it easier for context-dependent attackers to obtain sensitive information by leveraging a race condition in which a child process is created and accesses the PRNG within the same rate-limit period as another process.
References