-
Notifications
You must be signed in to change notification settings - Fork 331
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[GHSA-9v9h-cgj8-h64p] Issue summary: Processing a maliciously formatted PKCS12... #3472
[GHSA-9v9h-cgj8-h64p] Issue summary: Processing a maliciously formatted PKCS12... #3472
Conversation
Hey @m3t3kh4n, thanks for the PR, but I'm not sure I see the connection between pyca/cryptography@3519591 and this advisory. Any chance you can elaborate? |
Hey @darakian , they bumped OpenSSL version in CI (pyca/cryptography@f7032bd), that's the reason why I added this change. |
It is a little bit contradictory, I agree. But I saw that several other vulnerability resources bind this CVE with pyca/cryptography CPEs. |
Well lets dig a little to avoid just replicating what could be false assumptions. Looking at the advisory it calls out
and it looks like the cryptography library only uses one of those. Namely
Do you happen to have a test input that I could pass to this function to trigger the crash? There's some code in the function that looks like it might guard against this attack
|
Ok, I got some time to test this and using the three pkcs12 files which were added as tests to openssl here
So, it would appear that you are correct. I'll go ahead and get this merged. Edit:
|
d5baf7e
into
m3t3kh4n/advisory-improvement-3472
Hi @m3t3kh4n! Thank you so much for contributing to the GitHub Advisory Database. This database is free, open, and accessible to all, and it's people like you who make it great. Thanks for choosing to help others. We hope you send in more contributions in the future! |
Hello @darakian, sorry for the late response. This email thread lost in my inbox. I am happy that you checked and confirmed the vulnerability. Thank you very much! |
Updates
Comments
Change Title
Add Reference URLs
Add Affected Product
Add CWE