From d065a868d99d373fbb0b518f99ead00e9bf32f62e7d20bccf65f3c53ce905e7a Mon Sep 17 00:00:00 2001 From: Dirk Mueller Date: Fri, 15 Apr 2022 12:58:16 +0000 Subject: [PATCH] - drops CVE-2020-36242-buffer-overflow.patch on older dists - drops 5507-mitigate-Bleichenbacher-attacks.patch on older dists OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-cryptography?expand=0&rev=151 --- python-cryptography.changes | 2 ++ 1 file changed, 2 insertions(+) diff --git a/python-cryptography.changes b/python-cryptography.changes index bfa7e2e..161b268 100644 --- a/python-cryptography.changes +++ b/python-cryptography.changes @@ -125,6 +125,7 @@ Sun Feb 7 20:11:11 UTC 2021 - Michael Ströder calls when symmetrically encrypting very large payloads (>2GB) could result in an integer overflow, leading to buffer overflows. CVE-2020-36242 + - drops CVE-2020-36242-buffer-overflow.patch on older dists ------------------------------------------------------------------- Sun Dec 20 09:31:33 UTC 2020 - Dirk Müller @@ -182,6 +183,7 @@ Mon Oct 26 11:39:02 UTC 2020 - Michael Ströder by our API, we cannot completely mitigate this vulnerability. * Support for OpenSSL 1.0.2 has been removed. * Added basic support for PKCS7 signing (including SMIME) via PKCS7SignatureBuilder. +- drops 5507-mitigate-Bleichenbacher-attacks.patch on older dists ------------------------------------------------------------------- Mon Sep 28 10:49:56 UTC 2020 - Dirk Mueller