Safety vulnerability ID: 35362
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Elixir as on PyPI, is vulnerable to CVE-2012-2146: Elixir uses Blowfish in CFB mode without constructing a unique initialization vector (IV), which makes it easier for context-dependent users to obtain sensitive information and decrypt the database.
https://bugzilla.redhat.com/show_bug.cgi?id=810013
Latest version: 0.7.1
Declarative Mapper for SQLAlchemy
Elixir 0.8.0 uses Blowfish in CFB mode without constructing a unique initialization vector (IV), which makes it easier for context-dependent users to obtain sensitive information and decrypt the database.
MLIST:[oss-security] 20120427 weak use of crypto in python-elixir can lead to information disclosure (CVE and peer review request): http://www.openwall.com/lists/oss-security/2012/04/27/8
MLIST:[oss-security] 20120428 Re: weak use of crypto in python-elixir can lead to information disclosure (CVE and peer review request): http://www.openwall.com/lists/oss-security/2012/04/28/2
MLIST:[oss-security] 20120429 Re: weak use of crypto in python-elixir can lead to information disclosure (CVE and peer review request): http://www.openwall.com/lists/oss-security/2012/04/29/1
MISC:http://elixir.ematia.de/trac/ticket/119: http://elixir.ematia.de/trac/ticket/119
MISC:http://groups.google.com/group/sqlelixir/browse_thread/thread/efc16227514cffa?pli=1: http://groups.google.com/group/sqlelixir/browse_thread/thread/efc16227514cffa?pli=1
MISC:https://bugzilla.redhat.com/show_bug.cgi?id=810013: https://bugzilla.redhat.com/show_bug.cgi?id=810013
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application