Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2020-25658 and python-rsa #2053

Closed
davidhay1969 opened this issue May 9, 2023 · 5 comments
Closed

CVE-2020-25658 and python-rsa #2053

davidhay1969 opened this issue May 9, 2023 · 5 comments
Labels
kind/bug Categorizes issue or PR as related to a bug. lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed.

Comments

@davidhay1969
Copy link

What happened (please include outputs or screenshots):

Security scanners such as Sonatype suggest that : -

It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.

This ties up with CVE-2020-25658 which has been updated with: -

This vulnerability has been modified since it was last analyzed by the NVD. It is awaiting reanalysis which may result in further changes to the information provided.

I think that kubernetes/python includes python-rsa ??

Looking at one of my environments via pipdeptree I see : -

...
kubernetes==26.1.0
  - certifi [required: >=14.05.14, installed: 2023.5.7]
  - google-auth [required: >=1.0.1, installed: 2.17.3]
    - cachetools [required: >=2.0.0,<6.0, installed: 5.3.0]
    - pyasn1-modules [required: >=0.2.1, installed: 0.2.1]
    - rsa [required: >=3.1.4,<5, installed: 4.9]
      - pyasn1 [required: >=0.1.3, installed: 0.4.2]
    - six [required: >=1.9.0, installed: 1.14.0]
  - python-dateutil [required: >=2.5.3, installed: 2.8.2]
    - six [required: >=1.5, installed: 1.14.0]
  - pyyaml [required: >=5.4.1, installed: 6.0]
  - requests [required: Any, installed: 2.22.0]
  - requests-oauthlib [required: Any, installed: 1.3.1]
    - oauthlib [required: >=3.0.0, installed: 3.1.0]
    - requests [required: >=2.0.0, installed: 2.22.0]
  - setuptools [required: >=21.0.0, installed: 67.7.2]
  - six [required: >=1.9.0, installed: 1.14.0]
  - urllib3 [required: >=1.24.2, installed: 1.25.8]
  - websocket-client [required: >=0.32.0,!=0.42.*,!=0.41.*,!=0.40.0, installed: 1.5.1]
...

and, from another environment, where I'd previously cloned this repo and run pip3 install -r requirements.txt, I see: -

pipdeptree

...
google-auth==2.17.3
  - cachetools [required: >=2.0.0,<6.0, installed: 5.3.0]
  - pyasn1-modules [required: >=0.2.1, installed: 0.2.1]
  - rsa [required: >=3.1.4,<5, installed: 4.9]
    - pyasn1 [required: >=0.1.3, installed: 0.4.8]
  - six [required: >=1.9.0, installed: 1.16.0]
...

There is an issue - CVE-2020-25658 - Bleichenbacher-style timing oracle in PKCS#1 v1.5 decryption code #165 - which is closed.

A few months back, the CVE etc. were updated to suggest that rsa:4.7 mitigates the issue; this appears to have changed, and the latest version - 4.9 - is being reported as being vulnerable.

Apologies if my understanding is incorrect 😢

IF kubernetes does make use of python-rsa, is there any plan to move away from this, given the potential of this vulnerability ?

Environment:

python3 --version

Python 3.8.10

pip --version

pip 23.1.2 from /usr/local/lib/python3.8/dist-packages/pip (python 3.8)
@roycaihw
Copy link
Member

This library uses google-auth. It seems to me that the vulnerability needs to be fixed in google-auth

@k8s-triage-robot
Copy link

The Kubernetes project currently lacks enough contributors to adequately respond to all issues.

This bot triages un-triaged issues according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Mark this issue as fresh with /remove-lifecycle stale
  • Close this issue with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Jan 21, 2024
@k8s-triage-robot
Copy link

The Kubernetes project currently lacks enough active contributors to adequately respond to all issues.

This bot triages un-triaged issues according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Mark this issue as fresh with /remove-lifecycle rotten
  • Close this issue with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle rotten

@k8s-ci-robot k8s-ci-robot added lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels Feb 20, 2024
@k8s-triage-robot
Copy link

The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.

This bot triages issues according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Reopen this issue with /reopen
  • Mark this issue as fresh with /remove-lifecycle rotten
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/close not-planned

@k8s-ci-robot
Copy link
Contributor

@k8s-triage-robot: Closing this issue, marking it as "Not Planned".

In response to this:

The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.

This bot triages issues according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Reopen this issue with /reopen
  • Mark this issue as fresh with /remove-lifecycle rotten
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/close not-planned

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot closed this as not planned Won't fix, can't repro, duplicate, stale Mar 21, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/bug Categorizes issue or PR as related to a bug. lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed.
Projects
None yet
Development

No branches or pull requests

4 participants