CVE-2013-1895

NameCVE-2013-1895
DescriptionThe py-bcrypt module before 0.3 for Python does not properly handle concurrent memory access, which allows attackers to bypass authentication via multiple authentication requests, which trigger the password hash to be overwritten.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
Debian Bugs704030

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-bcrypt (PTS)stretch3.1.2-1fixed
buster3.1.6-1fixed
bullseye3.1.7-4fixed
bookworm, sid3.2.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-bcryptsourcesqueeze(not affected)
python-bcryptsource(unstable)0.4-1704030

Notes

[squeeze] - python-bcrypt <not-affected> (thread support only introduced after 0.1 release)
https://code.google.com/p/py-bcrypt/source/detail?r=b03cc5246ea21a839fd027da5616d8d470247558

Search for package or bug name: Reporting problems