{"schema_version":"1.7.2","id":"OESA-2023-1113","modified":"2023-02-21T11:04:56Z","published":"2023-02-21T11:04:56Z","upstream":["CVE-2023-23931"],"summary":"python-cryptography security update","details":"cryptography is a package designed to expose cryptographic primitives and recipes to Python developers.\r\n\r\nSecurity Fix(es):\r\n\r\ncryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8.(CVE-2023-23931)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP1","name":"python-cryptography","purl":"pkg:rpm/openEuler/python-cryptography\u0026distro=openEuler-22.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"36.0.1-2.oe2203sp1"}]}],"ecosystem_specific":{"aarch64":["python-cryptography-debuginfo-36.0.1-2.oe2203sp1.aarch64.rpm","python-cryptography-debugsource-36.0.1-2.oe2203sp1.aarch64.rpm","python3-cryptography-36.0.1-2.oe2203sp1.aarch64.rpm"],"noarch":["python-cryptography-help-36.0.1-2.oe2203sp1.noarch.rpm"],"src":["python-cryptography-36.0.1-2.oe2203sp1.src.rpm"],"x86_64":["python3-cryptography-36.0.1-2.oe2203sp1.x86_64.rpm","python-cryptography-debugsource-36.0.1-2.oe2203sp1.x86_64.rpm","python-cryptography-debuginfo-36.0.1-2.oe2203sp1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1113"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-23931"}],"database_specific":{"severity":"Medium"}}