Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in github.com/pyca/cryptography: CVE-2023-23931 #1536

Closed
GoVulnBot opened this issue Feb 7, 2023 · 1 comment
Assignees
Labels
excluded: NOT_GO_CODE This vulnerability does not refer to a Go module.

Comments

@GoVulnBot
Copy link

CVE-2023-23931 references github.com/pyca/cryptography, which may be a Go module.

Description:
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions Cipher.update_into would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as bytes) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since update_into was originally introduced in cryptography 1.8.

References:

Cross references:

See doc/triage.md for instructions on how to triage this report.

modules:
  - module: github.com/pyca/cryptography
    packages:
      - package: cryptography
description: |
    cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8.
cves:
  - CVE-2023-23931
references:
  - web: https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-vj6r
  - fix: https://github.com/pyca/cryptography/pull/8230/commits/94a50a9731f35405f0357fa5f3b177d46a726ab3

@tatianab tatianab added the excluded: NOT_GO_CODE This vulnerability does not refer to a Go module. label Feb 8, 2023
@tatianab tatianab self-assigned this Feb 8, 2023
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/467396 mentions this issue: data/excluded: batch add excluded reports

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
excluded: NOT_GO_CODE This vulnerability does not refer to a Go module.
Projects
None yet
Development

No branches or pull requests

3 participants