Use After Free The advisory has been revoked - it doesn't affect any version of package pyopenssl  (opens in a new tab)


Threat Intelligence

EPSS
13.47% (96th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use After Free vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UBUNTU1404-PYOPENSSL-614967
  • published8 Oct 2018
  • disclosed8 Oct 2018

Introduced: 8 Oct 2018

CVE-2018-1000807  (opens in a new tab)
CWE-416  (opens in a new tab)

Amendment

The Ubuntu security team deemed this advisory irrelevant for Ubuntu:14.04.

NVD Description

Note: Versions mentioned in the description apply only to the upstream pyopenssl package and not the pyopenssl package as distributed by Ubuntu.

Python Cryptographic Authority pyopenssl version prior to version 17.5.0 contains a CWE-416: Use After Free vulnerability in X509 object handling that can result in Use after free can lead to possible denial of service or remote code execution.. This attack appear to be exploitable via Depends on the calling application and if it retains a reference to the memory.. This vulnerability appears to have been fixed in 17.5.0.