Skip to content

📦 Bump versions of multiple dependencies to address vulnerabilities#1

Open
NelsonDivyamLobo wants to merge 2 commits intomainfrom
devtask/LINEAJE-TASK-1097
Open

📦 Bump versions of multiple dependencies to address vulnerabilities#1
NelsonDivyamLobo wants to merge 2 commits intomainfrom
devtask/LINEAJE-TASK-1097

Conversation

@NelsonDivyamLobo
Copy link

Lineaje has automatically created this pull request to resolve the following CVEs:

Component CVE ID Severity Description
pypi:flask:0.12 CVE-2023-30861 High When all of the following conditions are met, a response
containing data intended for one client may be cached and
subsequently sent by a proxy to other clients. If the proxy
also caches Set-Cookie headers, it may send one client's
session cookie to other clients. The severity depends on
the application's use of the session, and the proxy's
behavior regarding cookies. The risk depends on all these
conditions being met. 1. The application must be hosted
behind a caching proxy that does not strip cookies or ignore
responses with cookies. 2. The application sets
session.permanent =<br>True.
2. The application does not access or modify the session at
any point during a request. 4.
SESSION_REFRESH_EACH_REQUEST
is enabled (the default). 5. The application does not set a
Cache-Control header to indicate that a page is private or
should not be cached. This happens because vulnerable
versions of Flask only set the Vary: Cookie header when the
session is accessed or modified, not when it is refreshed
(re-sent to update the expiration) without being accessed or
modified.
pypi:flask:0.12 CVE-2018-1000656 High The Pallets Project flask version Before 0.12.3 contains a
CWE-20: Improper Input Validation vulnerability in flask that
can result in Large amount of memory usage possibly leading
to denial of service. This attack appear to be exploitable
via Attacker provides JSON data in incorrect encoding. This
vulnerability appears to have been fixed in 0.12.3.
pypi:flask:0.12 CVE-2019-1010083 High The Pallets Project Flask before 1.0 is affected by
unexpected memory usage. The impact is denial of service. The
attack vector is crafted encoded JSON data. The fixed version
is 1. NOTE this may overlap CVE-2018-1000656.
pypi:cryptography:2.3 CVE-2024-0727 Medium Issue summary: Processing a maliciously formatted PKCS12 file
may lead OpenSSL to crash leading to a potential Denial of
Service attack Impact summary: Applications loading files in
the PKCS12 format from untrusted sources might terminate
abruptly. A file in PKCS12 format can contain certificates
and keys and may come from an untrusted source. The PKCS12
specification allows certain fields to be NULL, but OpenSSL
does not correctly check for this case. This can lead to a
NULL pointer dereference that results in OpenSSL crashing. If
an application processes PKCS12 files from an untrusted
source using the OpenSSL APIs then that application will be
vulnerable to this issue. OpenSSL APIs that are vulnerable to
this are: PKCS12_parse(), PKCS12_unpack_p7data(),
PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and
PKCS12_newpass(). We have also fixed a similar issue in
SMIME_write_PKCS7(). However since this function is related
to writing data we do not consider it security significant.
The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this
issue.
pypi:cryptography:2.3 CVE-2020-25659 High RSA decryption was vulnerable to Bleichenbacher timing
vulnerabilities, which would impact people using RSA
decryption in online scenarios. This is fixed in cryptography
3.2.
pypi:cryptography:2.3 CVE-2023-0286 High pyca/cryptography's wheels include a statically linked copy
of OpenSSL. The versions of OpenSSL included in cryptography
0.8.1-39.0.0 are vulnerable to a security issue. More details
about the vulnerabilities themselves can be found in
https://www.openssl.org/news/secadv/20221213.txt and
https://www.openssl.org/news/secadv/20230207.txt. If you are
building cryptography source ("sdist") then you are
responsible for upgrading your copy of OpenSSL. Only users
installing from wheels built by the cryptography project
(i.e., those distributed on PyPI) need to update their
cryptography versions.
pypi:cryptography:2.3 CVE-2023-23931 Medium Previously, Cipher.update_into would accept Python objects
which implement the buffer protocol, but provide only
immutable buffers: pycon >>> outbuf = b"\x00" * 32 >>> c =<br>ciphers.Cipher(AES(b"\x00" * 32), modes.ECB()).encryptor()<br>>>> c.update_into(b"\x00" * 16, outbuf) 16 >>> outbuf<br>b'\xdc\x95\xc0x\xa2@\x89\x89\xadH\xa2\x14\x92\x84<br>\x87\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'<br> This would allow immutable objects (such as bytes) to
be mutated, thus violating fundamental rules of Python. This
is a soundness bug -- it allows programmers to misuse an API,
it cannot be exploited by attacker controlled data alone.
This now correctly raises an exception. This issue has been
present since update_into was originally introduced in
cryptography 1.8.
pypi:cryptography:2.3 GHSA-5cpq-8wj7-hf2v Low pyca/cryptography's wheels include a statically linked copy
of OpenSSL. The versions of OpenSSL included in cryptography
0.5-40.0.2 are vulnerable to a security issue. More details
about the vulnerability itself can be found in
https://www.openssl.org/news/secadv/20230530.txt. If you are
building cryptography source ("sdist") then you are
responsible for upgrading your copy of OpenSSL. Only users
installing from wheels built by the cryptography project
(i.e., those distributed on PyPI) need to update their
cryptography versions.
pypi:cryptography:2.3 GHSA-jm77-qphf-c4w8 Low pyca/cryptography's wheels include a statically linked copy
of OpenSSL. The versions of OpenSSL included in cryptography
0.8-41.0.2 are vulnerable to several security issues. More
details about the vulnerabilities themselves can be found in
https://www.openssl.org/news/secadv/20230731.txt,
https://www.openssl.org/news/secadv/20230719.txt, and
https://www.openssl.org/news/secadv/20230714.txt. If you are
building cryptography source ("sdist") then you are
responsible for upgrading your copy of OpenSSL. Only users
installing from wheels built by the cryptography project
(i.e., those distributed on PyPI) need to update their
cryptography versions.
pypi:cryptography:2.3 CVE-2023-50782 High A flaw was found in the python-cryptography package. This
issue may allow a remote attacker to decrypt captured
messages in TLS servers that use RSA key exchanges, which may
lead to exposure of confidential or sensitive data.

You can merge this PR once the tests pass and the changes are reviewed.

Thank you for reviewing the update! 🚀

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant