saltbundlepy-cryptography
No description set
- Sources inherited from project systemsmanagement:s...ack:bundle:testing
-
1
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout systemsmanagement:saltstack:bundle:testing:CentOS8/saltbundlepy-cryptography && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
cryptography-3.3.2.tar.gz | 0000539883 527 KB | |
cryptography-3.3.2.tar.gz.asc | 0000000488 488 Bytes | |
disable-uneven-sizes-tests.patch | 0000000681 681 Bytes | |
fix-build-with-old-ssl.patch | 0000009297 9.08 KB | |
saltbundlepy-cryptography.changes | 0000047929 46.8 KB | |
saltbundlepy-cryptography.keyring | 0000001847 1.8 KB | |
saltbundlepy-cryptography.spec | 0000004169 4.07 KB | |
skip_openssl_memleak_test.patch | 0000000794 794 Bytes |
Revision 5 (latest revision is 12)
Pablo Suárez Hernández (PSuarezHernandez)
accepted
request 991245
from
Victor Zhestkov (vzhestkov)
(revision 5)
- update to 3.3.2 (bsc#1182066, CVE-2020-36242, bsc#1198331): * SECURITY ISSUE: Fixed a bug where certain sequences of update() calls when symmetrically encrypting very large payloads (>2GB) could result in an integer overflow, leading to buffer overflows. CVE-2020-36242 - drops CVE-2020-36242-buffer-overflow.patch on older dists - update to 3.3.1: * Re-added a legacy symbol causing problems for older ``pyOpenSSL`` use - update to 3.3.0 - BACKWARDS INCOMPATIBLE: Support for Python 3.5 has been removed due to low usage and maintenance burden. - BACKWARDS INCOMPATIBLE: The GCM and AESGCM now require 64-bit to 1024-bit (8 byte to 128 byte) initialization vectors. This change is to conform with an upcoming OpenSSL release that will no longer support sizes outside this window. - BACKWARDS INCOMPATIBLE: When deserializing asymmetric keys we now raise ValueError rather than UnsupportedAlgorithm when an unsupported cipher is used. This change is to conform with an upcoming OpenSSL release that will no longer distinguish between error types. - BACKWARDS INCOMPATIBLE: We no longer allow loading of finite field Diffie-Hellman parameters of less than 512 bits in length. This change is to conform with an upcoming OpenSSL release that no longer supports smaller sizes. These keys were already wildly insecure and should not have been used in any application outside of testing. - Updated Windows, macOS, and manylinux wheels to be compiled with OpenSSL 1.1.1i. - Python 2 support is deprecated in cryptography. This is the last release that will support Python 2.
Comments 0