CVE-2023-23931: Cipher.update_into can corrupt memory if passed an immutable python object as the outbuf
(updated )
Previously, Cipher.update_into
would accept Python objects which implement the buffer protocol, but provide only immutable buffers:
>>> outbuf = b"\x00" * 32
>>> c = ciphers.Cipher(AES(b"\x00" * 32), modes.ECB()).encryptor()
>>> c.update_into(b"\x00" * 16, outbuf)
16
>>> outbuf
b'\xdc\x95\xc0x\xa2@\x89\x89\xadH\xa2\x14\x92\x84 \x87\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
This would allow immutable objects (such as bytes
) to be mutated, thus violating fundamental rules of Python. This is a soundness bug – it allows programmers to misuse an API, it cannot be exploited by attacker controlled data alone.
This now correctly raises an exception.
This issue has been present since update_into
was originally introduced in cryptography 1.8.
References
- github.com/advisories/GHSA-w7pp-m8wf-vj6r
- github.com/pyca/cryptography
- github.com/pyca/cryptography/commit/d6951dca25de45abd52da51b608055371fbcde4e
- github.com/pyca/cryptography/pull/8230
- github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-vj6r
- github.com/pypa/advisory-database/tree/main/vulns/cryptography/PYSEC-2023-11.yaml
- nvd.nist.gov/vuln/detail/CVE-2023-23931
Detect and mitigate CVE-2023-23931 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →