In the cryptography package before 3.3.2 for Python, certain sequences of update calls to symmetrically encrypt multi-GB values could result in an integer overflow and buffer overflow, as demonstrated by the Fernet class.
References
Link | Resource |
---|---|
https://github.com/pyca/cryptography/issues/5615 | Exploit Patch Third Party Advisory |
https://github.com/pyca/cryptography/blob/master/CHANGELOG.rst | Release Notes Third Party Advisory |
https://github.com/pyca/cryptography/compare/3.3.1...3.3.2 | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7RGQLK4J5ZQFRLKCHVVG6BKZTUQMG7E/ | Mailing List Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
Configurations
Information
Published : 2021-02-07 12:15
Updated : 2022-12-06 13:52
NVD link : CVE-2020-36242
Mitre link : CVE-2020-36242
JSON object : View
Products Affected
oracle
- communications_cloud_native_core_network_function_cloud_native_environment
cryptography_project
- cryptography
fedoraproject
- fedora