You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Seems we have a dependency with a security flaw https://www.cve.org/CVERecord?id=CVE-2024-23342. Did anyone assess the risk associated with using the fastapi-azure-auth library with this dependency?
According to the maintainer it's a "wontfix" tlsfuzzer/python-ecdsa#330 (comment) so if it is unsafe we should probably switch to a non-pure python implementation of string comparisons.
The text was updated successfully, but these errors were encountered:
We already use cryptography as the backend, and do not allow our users to configure it. There is no impact for our users of this library. The reason we get this warning is because Python-Jose allow you to configure backends, and ecdsa is one for them.
How ever, Python-Jose seems to be pretty un maintained, which raises an argument to switch to PyJWT. I'll close this issue, but this discussion can be continued if we/anyone see a need to migrate.
JonasKs
changed the title
CVE-2024-23342 ecdsa may be vulnerable to the Minerva attack
SOLVED: CVE-2024-23342 ecdsa may be vulnerable to the Minerva attack
Feb 2, 2024
Seems we have a dependency with a security flaw https://www.cve.org/CVERecord?id=CVE-2024-23342. Did anyone assess the risk associated with using the
fastapi-azure-auth
library with this dependency?According to the maintainer it's a "wontfix" tlsfuzzer/python-ecdsa#330 (comment) so if it is unsafe we should probably switch to a non-pure python implementation of string comparisons.
The text was updated successfully, but these errors were encountered: