{"schema_version":"1.7.2","id":"OESA-2023-1090","modified":"2023-02-17T11:04:54Z","published":"2023-02-17T11:04:54Z","upstream":["CVE-2023-23931"],"summary":"python-cryptography security update","details":"cryptography is a package designed to expose cryptographic primitives and recipes to Python developers.\r\n\r\nSecurity Fix(es):\r\n\r\ncryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8.(CVE-2023-23931)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP3","name":"python-cryptography","purl":"pkg:rpm/openEuler/python-cryptography\u0026distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.3.1-3.oe1"}]}],"ecosystem_specific":{"aarch64":["python-cryptography-debuginfo-3.3.1-3.oe1.aarch64.rpm","python-cryptography-debugsource-3.3.1-3.oe1.aarch64.rpm","python2-cryptography-3.3.1-3.oe1.aarch64.rpm","python3-cryptography-3.3.1-3.oe1.aarch64.rpm"],"noarch":["python-cryptography-help-3.3.1-3.oe1.noarch.rpm"],"src":["python-cryptography-3.3.1-3.oe1.src.rpm"],"x86_64":["python-cryptography-debuginfo-3.3.1-3.oe1.x86_64.rpm","python3-cryptography-3.3.1-3.oe1.x86_64.rpm","python2-cryptography-3.3.1-3.oe1.x86_64.rpm","python-cryptography-debugsource-3.3.1-3.oe1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1090"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-23931"}],"database_specific":{"severity":"Medium"}}