NULL Pointer Dereference Affecting python3.11-cryptography package, versions <0:37.0.2-6.el8


Severity

Recommended
medium

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.09% (41st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-PYTHON311CRYPTOGRAPHY-6133194
  • published20 Dec 2023
  • disclosed28 Nov 2023

Introduced: 28 Nov 2023

CVE-2023-49083  (opens in a new tab)
CWE-476  (opens in a new tab)

How to fix?

Upgrade RHEL:8 python3.11-cryptography to version 0:37.0.2-6.el8 or higher.
This issue was patched in RHSA-2024:3105.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python3.11-cryptography package and not the python3.11-cryptography package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Calling load_pem_pkcs7_certificates or load_der_pkcs7_certificates could lead to a NULL-pointer dereference and segfault. Exploitation of this vulnerability poses a serious risk of Denial of Service (DoS) for any application attempting to deserialize a PKCS7 blob/certificate. The consequences extend to potential disruptions in system availability and stability. This vulnerability has been patched in version 41.0.6.

CVSS Scores

version 3.1