Improper Check for Unusual or Exceptional Conditions Affecting python39:3.9/python39-cryptography package, versions <0:3.3.1-3.module+el8.10.0+21271+eccd1d86


Severity

Recommended
0.0
medium
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.08% (35th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-PYTHON39-7057421
  • published23 May 2024
  • disclosed8 Feb 2023

Introduced: 8 Feb 2023

CVE-2023-23931  (opens in a new tab)
CWE-754  (opens in a new tab)

How to fix?

Upgrade RHEL:8 python39:3.9/python39-cryptography to version 0:3.3.1-3.module+el8.10.0+21271+eccd1d86 or higher.
This issue was patched in RHSA-2024:2985.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python39:3.9/python39-cryptography package and not the python39:3.9/python39-cryptography package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions Cipher.update_into would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as bytes) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since update_into was originally introduced in cryptography 1.8.

CVSS Scores

version 3.1