CVE-2023-49083 – cryptography vulnerable to NULL-dereference when loading PKCS7 certificates
https://notcve.org/view.php?id=CVE-2023-49083
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Calling `load_pem_pkcs7_certificates` or `load_der_pkcs7_certificates` could lead to a NULL-pointer dereference and segfault. Exploitation of this vulnerability poses a serious risk of Denial of Service (DoS) for any application attempting to deserialize a PKCS7 blob/certificate. The consequences extend to potential disruptions in system availability and stability. This vulnerability has been patched in version 41.0.6. cryptography es un paquete diseñado para exponer recetas y primitivas criptográficas a los desarrolladores de Python. • https://github.com/pyca/cryptography/commit/f09c261ca10a31fe41b1262306db7f8f1da0e48a https://github.com/pyca/cryptography/pull/9926 https://github.com/pyca/cryptography/security/advisories/GHSA-jfhm-5ghh-2f97 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMNTYMUGFJSDBYBU22FUYBHFRZODRKXV https://access.redhat.com/security/cve/CVE-2023-49083 https://bugzilla.redhat.com/show_bug.cgi?id=2255331 • CWE-476: NULL Pointer Dereference •
CVE-2023-23931 – Cipher.update_into can corrupt memory in pyca cryptography
https://notcve.org/view.php?id=CVE-2023-23931
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8. • https://github.com/pyca/cryptography/pull/8230/commits/94a50a9731f35405f0357fa5f3b177d46a726ab3 https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-vj6r https://access.redhat.com/security/cve/CVE-2023-23931 https://bugzilla.redhat.com/show_bug.cgi?id=2171817 • CWE-754: Improper Check for Unusual or Exceptional Conditions •
CVE-2020-36242 – python-cryptography: Large inputs for symmetric encryption can trigger integer overflow leading to buffer overflow
https://notcve.org/view.php?id=CVE-2020-36242
In the cryptography package before 3.3.2 for Python, certain sequences of update calls to symmetrically encrypt multi-GB values could result in an integer overflow and buffer overflow, as demonstrated by the Fernet class. En el paquete de criptografía versiones anteriores a 3.3.2 para Python, determinadas secuencias de llamadas de actualización para cifrar simétricamente valores de varios GB podrían resultar en un desbordamiento de enteros y un desbordamiento del búfer, como es demostrado por la clase Fernet A buffer-overflow flaw was found in the python-cryptography package. In certain sequences of ``update()`` calls when symmetrically encrypting very large payloads (>2GB) could result in an integer overflow, leading to buffer overflows. Note: This fix is a workaround for the OpenSSL CVE-2021-23840 flaw. Source: pyca/cryptography project • https://github.com/pyca/cryptography/blob/master/CHANGELOG.rst https://github.com/pyca/cryptography/compare/3.3.1...3.3.2 https://github.com/pyca/cryptography/issues/5615 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7RGQLK4J5ZQFRLKCHVVG6BKZTUQMG7E https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujul2022.html https://access.redhat.com/security/cve/CVE-2020-36242 https://bugzilla.redhat.com/show_bug& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •
CVE-2016-9243
https://notcve.org/view.php?id=CVE-2016-9243
HKDF in cryptography before 1.5.2 returns an empty byte-string if used with a length less than algorithm.digest_size. HKDF en criptografía en versiones anteriores a 1.5.2 devuelve una cadena de bytes vacía si se utiliza con una longitud inferior que algorithm.digest_size. • http://www.openwall.com/lists/oss-security/2016/11/09/2 http://www.securityfocus.com/bid/94216 http://www.ubuntu.com/usn/USN-3138-1 https://cryptography.io/en/latest/changelog https://github.com/pyca/cryptography/commit/b924696b2e8731f39696584d12cceeb3aeb2d874 https://github.com/pyca/cryptography/issues/3211 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R2ZOBMPWDFFHUZ6QOZZY36A6H5CGJXL https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraprojec • CWE-20: Improper Input Validation •