Cryptography.io Cryptography 3.3.1 for Python

CPE Details

Cryptography.io Cryptography 3.3.1 for Python
3.3.1
2024-09-05
14h09 +00:00
2024-09-05
14h09 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:cryptography.io:cryptography:3.3.1:*:*:*:*:python:*:*

Informations

Vendor

cryptography.io

Product

cryptography

Version

3.3.1

Target Software

python

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-50782 2024-02-05 20h45 +00:00 A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.
7.5
High
CVE-2023-49083 2023-11-29 18h50 +00:00 cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Calling `load_pem_pkcs7_certificates` or `load_der_pkcs7_certificates` could lead to a NULL-pointer dereference and segfault. Exploitation of this vulnerability poses a serious risk of Denial of Service (DoS) for any application attempting to deserialize a PKCS7 blob/certificate. The consequences extend to potential disruptions in system availability and stability. This vulnerability has been patched in version 41.0.6.
7.5
High
CVE-2023-23931 2023-02-07 20h54 +00:00 cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8.
6.5
Medium
CVE-2020-36242 2021-02-07 18h50 +00:00 In the cryptography package before 3.3.2 for Python, certain sequences of update calls to symmetrically encrypt multi-GB values could result in an integer overflow and buffer overflow, as demonstrated by the Fernet class.
9.1
Critical