First published: Wed Jul 18 2018(Updated: )
A flaw was found in python-cryptography versions between >=1.9.0 and <2.3. The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the MAC check. GCM tag forgeries can cause key leakage. Upstream patch: <a href="https://github.com/pyca/cryptography/pull/4342/commits/688e0f673bfbf43fa898994326c6877f00ab19ef">https://github.com/pyca/cryptography/pull/4342/commits/688e0f673bfbf43fa898994326c6877f00ab19ef</a> References: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - Possible tag truncation security bug in AEAD API" href="show_bug.cgi?id=1602752">https://bugzilla.redhat.com/show_bug.cgi?id=1602752</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cryptography Python-cryptography | >=1.9.0<2.3 | |
Redhat Openstack | =13 | |
Canonical Ubuntu Linux | =18.04 | |
redhat/python-cryptography | <2.3 | 2.3 |
pip/cryptography | >=1.9.0<2.3 | 2.3 |
debian/python-cryptography | 3.3.2-1 38.0.4-3 38.0.4-3~deb12u1 42.0.5-2 43.0.0-1 |
https://github.com/pyca/cryptography/pull/4342/commits/688e0f673bfbf43fa898994326c6877f00ab19ef
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.