python-cryptography

Edit Package python-cryptography
No description set
Refresh
Refresh
Source Files
Filename Size Changed
CVE-2020-36242-buffer-overflow.patch 0000003856 3.77 KB
add_X509_up_ref.patch 0000000880 880 Bytes
cryptography-2.0.3.tar.gz 0000427544 418 KB
cryptography-2.0.3.tar.gz.asc 0000000488 488 Bytes
cryptography_vectors-2.0.3.tar.gz 0027011810 25.8 MB
cryptography_vectors-2.0.3.tar.gz.asc 0000000488 488 Bytes
disable-uneven-sizes-tests.patch 0000000678 678 Bytes
disallow_implicit_tag_truncation.patch 0000003041 2.97 KB
python-cryptography.changes 0000028904 28.2 KB
python-cryptography.keyring 0000001847 1.8 KB
python-cryptography.spec 0000004927 4.81 KB
skip_openssl_memleak_test.patch 0000000674 674 Bytes
Latest Revision
Gayane Osipyan's avatar Gayane Osipyan (gosipyan) accepted request 894007 from Johannes Grassler's avatar Johannes Grassler (jgrassler) (revision 2)
- Add patch CVE-2020-36242-buffer-overflow.patch (bsc#1182066, CVE-2020-36242)
  * Using the Fernet class to symmetrically encrypt multi gigabyte values
    could result in an integer overflow and buffer overflow. 

- Add add_X509_up_ref.patch to provide X509_up_ref() function to help
  pyOpenSSL deal with CVE-2018-1000807 (bsc#1111635) and
  CVE-2018-1000808 (bsc#1111634).

- bsc#1101820 CVE-2018-10903 GCM tag forgery via truncated tag in
  finalize_with_tag API
  * add disallow_implicit_tag_truncation.patch from
    https://github.com/pyca/cryptography/commit/688e0f673bfb.patch

- Disable memleak tests to fix build with OpenSSL 1.1 (bsc#1055478)
  * add skip_openssl_memleak_test.patch
Comments 0
openSUSE Build Service is sponsored by