aiootp@0.18.0 vulnerabilities

a high-level async cryptographic anonymity library to scale, simplify, & automate privacy best practices for secure data & identity processing, communication, & storage.

Direct Vulnerabilities

Known vulnerabilities in the aiootp package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Insufficient Entropy

aiootp is an aiootp - an asynchronous pseudo-one-time-pad based crypto and anonymity library.

Affected versions of this package are vulnerable to Insufficient Entropy such that the top-level '(a)csprng' functions were found to be unsafe in concurrent code, leading to the possibility of producing identical outputs from distinct calls if run in quick succession from concurrently running threads & co-routines.

Note: This vulnerability does not effect users of the library which are not running it in multiple concurrent threads or co-routines.

How to fix Insufficient Entropy?

Upgrade aiootp to version 0.22.0 or higher.

[,0.22.0)
  • M
Cryptographic Issues

aiootp is an aiootp - an asynchronous pseudo-one-time-pad based crypto and anonymity library.

Affected versions of this package are vulnerable to Cryptographic Issues. If an adversary can get a user to reveal the value returned by the hmac method when fed the tag file's filename & the salt used for that encrypted tag, then they could deduce the decryption key for the tag. This version check is here only for backwards compatibility & will be removed on the next update.

How to fix Cryptographic Issues?

Upgrade aiootp to version 0.18.1 or higher.

[,0.18.1)