CVE-2024-26130

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-26130
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26130.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-26130
Aliases
Related
Published
2024-02-21T17:15:09Z
Modified
2024-10-22T05:29:00.721756Z
Summary
[none]
Details

cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Starting in version 38.0.0 and prior to version 42.0.4, if pkcs12.serialize_key_and_certificates is called with both a certificate whose public key did not match the provided private key and an encryption_algorithm with hmac_hash set (via PrivateFormat.PKCS12.encryption_builder().hmac_hash(...), then a NULL pointer dereference would occur, crashing the Python process. This has been resolved in version 42.0.4, the first version in which a ValueError is properly raised.

References

Affected packages

Debian:12 / python-cryptography

Package

Name
python-cryptography
Purl
pkg:deb/debian/python-cryptography?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

38.*

38.0.4-3
38.0.4-4

41.*

41.0.7-1
41.0.7-2
41.0.7-3
41.0.7-4
41.0.7-5

42.*

42.0.5-1
42.0.5-2

43.*

43.0.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / python-cryptography

Package

Name
python-cryptography
Purl
pkg:deb/debian/python-cryptography?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
42.0.5-1

Affected versions

38.*

38.0.4-3
38.0.4-4

41.*

41.0.7-1
41.0.7-2
41.0.7-3
41.0.7-4
41.0.7-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/pyca/cryptography

Affected ranges

Type
GIT
Repo
https://github.com/pyca/cryptography
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.1
0.2
0.3
0.4
0.5
0.5.1
0.6
0.7
0.8
0.9

1.*

1.0
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9

2.*

2.0
2.1
2.2
2.3
2.4
2.4.1
2.5
2.6
2.6.1
2.7
2.8
2.9

3.*

3.0
3.1
3.2
3.3
3.4

35.*

35.0.0

36.*

36.0.0

37.*

37.0.0

38.*

38.0.0

39.*

39.0.0

40.*

40.0.0

41.*

41.0.0

42.*

42.0.0