Accepting request 969246 from devel:languages:python

- update to 3.3.2 (bsc#1182066, CVE-2020-36242):
- update to 3.2 (bsc#1178168, CVE-2020-25659):

OBS-URL: https://build.opensuse.org/request/show/969246
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-cryptography?expand=0&rev=61
This commit is contained in:
Dominique Leuenberger 2022-04-12 19:50:20 +00:00 committed by Git OBS Bridge
commit a967137efe

View File

@ -120,7 +120,7 @@ Mon Apr 26 10:07:08 UTC 2021 - Matej Cepl <mcepl@suse.com>
-------------------------------------------------------------------
Sun Feb 7 20:11:11 UTC 2021 - Michael Ströder <michael@stroeder.com>
- update to 3.3.2:
- update to 3.3.2 (bsc#1182066, CVE-2020-36242):
* SECURITY ISSUE: Fixed a bug where certain sequences of update()
calls when symmetrically encrypting very large payloads (>2GB) could
result in an integer overflow, leading to buffer overflows.
@ -176,7 +176,7 @@ Wed Oct 28 14:29:05 UTC 2020 - Michael Ströder <michael@stroeder.com>
-------------------------------------------------------------------
Mon Oct 26 11:39:02 UTC 2020 - Michael Ströder <michael@stroeder.com>
- update to 3.2:
- update to 3.2 (bsc#1178168, CVE-2020-25659):
* CVE-2020-25659: Attempted to make RSA PKCS#1v1.5 decryption more constant time,
to protect against Bleichenbacher vulnerabilities. Due to limitations imposed
by our API, we cannot completely mitigate this vulnerability.