python-cryptography
No description set
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout Cloud:OpenStack:Pike/python-cryptography && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
CVE-2020-36242-buffer-overflow.patch | 0000003856 3.77 KB | |
add_X509_up_ref.patch | 0000000880 880 Bytes | |
cryptography-2.0.3.tar.gz | 0000427544 418 KB | |
cryptography-2.0.3.tar.gz.asc | 0000000488 488 Bytes | |
cryptography_vectors-2.0.3.tar.gz | 0027011810 25.8 MB | |
cryptography_vectors-2.0.3.tar.gz.asc | 0000000488 488 Bytes | |
disable-uneven-sizes-tests.patch | 0000000678 678 Bytes | |
disallow_implicit_tag_truncation.patch | 0000003041 2.97 KB | |
python-cryptography.changes | 0000028904 28.2 KB | |
python-cryptography.keyring | 0000001847 1.8 KB | |
python-cryptography.spec | 0000004927 4.81 KB | |
skip_openssl_memleak_test.patch | 0000000674 674 Bytes |
Latest Revision
Gayane Osipyan (gosipyan)
accepted
request 894007
from
Johannes Grassler (jgrassler)
(revision 2)
- Add patch CVE-2020-36242-buffer-overflow.patch (bsc#1182066, CVE-2020-36242) * Using the Fernet class to symmetrically encrypt multi gigabyte values could result in an integer overflow and buffer overflow. - Add add_X509_up_ref.patch to provide X509_up_ref() function to help pyOpenSSL deal with CVE-2018-1000807 (bsc#1111635) and CVE-2018-1000808 (bsc#1111634). - bsc#1101820 CVE-2018-10903 GCM tag forgery via truncated tag in finalize_with_tag API * add disallow_implicit_tag_truncation.patch from https://github.com/pyca/cryptography/commit/688e0f673bfb.patch - Disable memleak tests to fix build with OpenSSL 1.1 (bsc#1055478) * add skip_openssl_memleak_test.patch
Comments 0