CVE-2024-26130 – cryptography NULL pointer deference with pkcs12.serialize_key_and_certificates when called with a non-matching certificate and private key and an hmac_hash override
https://notcve.org/view.php?id=CVE-2024-26130
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Starting in version 38.0.0 and prior to version 42.0.4, if `pkcs12.serialize_key_and_certificates` is called with both a certificate whose public key did not match the provided private key and an `encryption_algorithm` with `hmac_hash` set (via `PrivateFormat.PKCS12.encryption_builder().hmac_hash(...)`, then a NULL pointer dereference would occur, crashing the Python process. This has been resolved in version 42.0.4, the first version in which a `ValueError` is properly raised. cryptography es un paquete manipulado para exponer recetas y primitivas criptográficas a los desarrolladores de Python. A partir de la versión 38.0.0 y anteriores a la versión 42.0.4, si se llama a `pkcs12.serialize_key_and_certificates` con un certificado cuya clave pública no coincide con la clave privada proporcionada y un `encryption_algorithm` con `hmac_hash` configurado (a través de `PrivateFormat .PKCS12.encryption_builder().hmac_hash(...)`, entonces se produciría una desreferencia del puntero NULL, bloqueando el proceso de Python. Esto se resolvió en la versión 42.0.4, la primera versión en la que se genera correctamente un `ValueError` . • https://github.com/pyca/cryptography/commit/97d231672763cdb5959a3b191e692a362f1b9e55 https://github.com/pyca/cryptography/pull/10423 https://github.com/pyca/cryptography/security/advisories/GHSA-6vqw-3v5j-54x4 https://access.redhat.com/security/cve/CVE-2024-26130 https://bugzilla.redhat.com/show_bug.cgi?id=2269617 • CWE-476: NULL Pointer Dereference •
CVE-2023-49083 – cryptography vulnerable to NULL-dereference when loading PKCS7 certificates
https://notcve.org/view.php?id=CVE-2023-49083
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Calling `load_pem_pkcs7_certificates` or `load_der_pkcs7_certificates` could lead to a NULL-pointer dereference and segfault. Exploitation of this vulnerability poses a serious risk of Denial of Service (DoS) for any application attempting to deserialize a PKCS7 blob/certificate. The consequences extend to potential disruptions in system availability and stability. This vulnerability has been patched in version 41.0.6. cryptography es un paquete diseñado para exponer recetas y primitivas criptográficas a los desarrolladores de Python. • https://github.com/pyca/cryptography/commit/f09c261ca10a31fe41b1262306db7f8f1da0e48a https://github.com/pyca/cryptography/pull/9926 https://github.com/pyca/cryptography/security/advisories/GHSA-jfhm-5ghh-2f97 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMNTYMUGFJSDBYBU22FUYBHFRZODRKXV https://access.redhat.com/security/cve/CVE-2023-49083 https://bugzilla.redhat.com/show_bug.cgi?id=2255331 • CWE-476: NULL Pointer Dereference •
CVE-2023-38325
https://notcve.org/view.php?id=CVE-2023-38325
The cryptography package before 41.0.2 for Python mishandles SSH certificates that have critical options. • https://github.com/pyca/cryptography/compare/41.0.1...41.0.2 https://github.com/pyca/cryptography/issues/9207 https://github.com/pyca/cryptography/pull/9208 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMCCTYY3CSNQBFFYYC5DAV6KATHWCUZK https://pypi.org/project/cryptography/#history https://security.netapp.com/advisory/ntap-20230824-0010 • CWE-295: Improper Certificate Validation •
CVE-2023-23931 – Cipher.update_into can corrupt memory in pyca cryptography
https://notcve.org/view.php?id=CVE-2023-23931
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8. • https://github.com/pyca/cryptography/pull/8230/commits/94a50a9731f35405f0357fa5f3b177d46a726ab3 https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-vj6r https://access.redhat.com/security/cve/CVE-2023-23931 https://bugzilla.redhat.com/show_bug.cgi?id=2171817 • CWE-754: Improper Check for Unusual or Exceptional Conditions •