/dev-python/elixir/files/elixir-0.7.1-CVE-2012-2146-aes.patch

https://bitbucket.org/lmnd/gentoo-x86 · Patch · 85 lines · 75 code · 10 blank · 0 comment · 0 complexity · 2b8b7a7aa9f549c3efbffb3952952f4f MD5 · raw file

  1. Upstream patch acquired from
  2. http://sochotni.fedorapeople.org/python-elixir-aes-encryption-addition.patch
  3. Index: elixir/ext/encrypted.py
  4. ===================================================================
  5. --- elixir/ext/encrypted.py (revision 534)
  6. +++ elixir/ext/encrypted.py (working copy)
  7. @@ -32,7 +32,9 @@
  8. database row.
  9. '''
  10. -from Crypto.Cipher import Blowfish
  11. +import sys
  12. +import os
  13. +from Crypto.Cipher import Blowfish, AES
  14. from elixir.statements import Statement
  15. from sqlalchemy.orm import MapperExtension, EXT_CONTINUE, EXT_STOP
  16. @@ -49,7 +51,9 @@
  17. #
  18. # encryption and decryption functions
  19. #
  20. -
  21. +# WARNING!!! Blowfish encryption method is vulnerable to attacks
  22. +# because it doesn't properly use random seed. It is provided just for
  23. +# backward compatibility needed to migrate data. Use AES instead!
  24. def encrypt_value(value, secret):
  25. return Blowfish.new(secret, Blowfish.MODE_CFB) \
  26. .encrypt(value).encode('string_escape')
  27. @@ -58,14 +62,36 @@
  28. return Blowfish.new(secret, Blowfish.MODE_CFB) \
  29. .decrypt(value.decode('string_escape'))
  30. +# Crypto.Cipher.AES is AES128
  31. +def encrypt_value_aes(value, secret):
  32. + iv = os.urandom(AES.block_size)
  33. + pad_len = AES.block_size - len(value) % AES.block_size
  34. + padded_value = value + pad_len * chr(pad_len)
  35. + res = iv + AES.new(secret, AES.MODE_CBC, iv).encrypt(padded_value)
  36. + return res.encode('string_escape')
  37. +
  38. +def decrypt_value_aes(value, secret):
  39. + value = value.decode('string_escape')
  40. + iv = value[:AES.block_size]
  41. + encrypted = value[AES.block_size:]
  42. +
  43. + padded_value = AES.new(secret, AES.MODE_CBC, iv).decrypt(encrypted)
  44. + pad_len = ord(padded_value[-1])
  45. + assert pad_len >= 1 and pad_len <= AES.block_size
  46. + return padded_value[:-pad_len]
  47. +
  48. #
  49. # acts_as_encrypted statement
  50. #
  51. class ActsAsEncrypted(object):
  52. - def __init__(self, entity, for_fields=[], with_secret='abcdef'):
  53. + def __init__(self, entity, for_fields=[], with_secret='abcdef', with_aes=False):
  54. + if not with_aes:
  55. + sys.stderr.write("""******* WARNING!!! ********
  56. +Blowfish encryption method is vulnerable to attacks.
  57. +Migrate your data and use with_aes=True\n""")
  58. def perform_encryption(instance, encrypt=True):
  59. encrypted = getattr(instance, '_elixir_encrypted', None)
  60. @@ -77,9 +103,15 @@
  61. instance._elixir_encrypted = encrypt
  62. if encrypt:
  63. - func = encrypt_value
  64. + if with_aes:
  65. + func = encrypt_value_aes
  66. + else:
  67. + func = encrypt_value
  68. else:
  69. - func = decrypt_value
  70. + if with_aes:
  71. + func = decrypt_value_aes
  72. + else:
  73. + func = decrypt_value
  74. for column_name in for_fields:
  75. current_value = getattr(instance, column_name)