44.0.2
11 years ago
1 months ago
Known vulnerabilities in the cryptography package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Missing Report of Error Condition causing server authentication failures to not be detected by clients, due to handshakes not aborting as expected when the Note:
How to fix Missing Report of Error Condition? Upgrade | [42.0.0,44.0.1) |
Affected versions of this package are vulnerable to Type Confusion in the Note: Users that are building cryptography source ("sdist") are responsible for upgrading their copy of OpenSSL. How to fix Type Confusion? Upgrade | [37.0.0,43.0.1) |
Affected versions of this package are vulnerable to Uncontrolled Resource Consumption due to improper user input validation in the Note: OpenSSL does not call these functions on untrusted DSA keys, so only applications that directly call these functions may be vulnerable. Also vulnerable are the OpenSSL How to fix Uncontrolled Resource Consumption? Upgrade | [0,42.0.8) |
Affected versions of this package are vulnerable to Uncontrolled Resource Consumption ('Resource Exhaustion') due to the session cache entering an incorrect state and failing to flush properly as it fills, leading to uncontrolled memory consumption. This condition is triggered under certain server configurations when processing TLSv1.3 sessions. Specifically, this occurs if the non-default Note: This issue is only exploitable if the server supports TLSv1.3 and is configured with the How to fix Uncontrolled Resource Consumption ('Resource Exhaustion')? Upgrade | [35.0.0,42.0.6) |