Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-23931
HistoryFeb 07, 2023 - 12:00 a.m.

CVE-2023-23931

2023-02-0700:00:00
ubuntu.com
ubuntu.com
16

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.001 Low

EPSS

Percentile

28.2%

cryptography is a package designed to expose cryptographic primitives and
recipes to Python developers. In affected versions Cipher.update_into
would accept Python objects which implement the buffer protocol, but
provide only immutable buffers. This would allow immutable objects (such as
bytes) to be mutated, thus violating fundamental rules of Python and
resulting in corrupted output. This now correctly raises an exception. This
issue has been present since update_into was originally introduced in
cryptography 1.8.

Bugs

Notes

Author Note
mdeslaur Per the upstream advisory: “This is a soundness bug – it allows programmers to misuse an API, it cannot be exploited by attacker controlled data alone.”
seth-arnold Debian’s update was incomplete, see 2.6.1-3+deb10u4
ccdm94 as per the advisory, this vulnerability was introduced in version 1.8.

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.001 Low

EPSS

Percentile

28.2%