47ead6f81bAccepting request 1235049 from security
factory
Ana Guerrero
2025-01-07 19:51:25 +00:00
a817f0b2f2- Fixes GHSA-4fg7-vxc8-qx5w - Update to version 0.11.1+0: * Fixed a security vulnerability that could allow an attacker to execute an arbitrary binary under certain conditions. Plugin names are now required to only contain alphanumeric characters or the four special characters +-._. * Replace the test NoCallbacks with the library version * Restrict set of valid characters for plugin names * Add tests for invalid plugin name chars - Update to 0.11.0+0: Added: * Partial French translation! Fixed: * [Unix] Files can now be encrypted with rage --passphrase when piped over stdin, without requiring an explicit - argument as INPUT. - bsc#1229959 - RUSTSEC-2024-0006 - CVE-2024-43806 - rust-shlex: Multiple issues involving quote API - bsc#1229959 - RUSTSEC-2024-0006 - rust-shlex: Multiple issues involving quote API - Enable tests - Install all language manpages - Fix -keygen installing to -mount - Switch from obsoleted practices to modern ones: * %setup is now %autosetup * cargo_config is now part of vendor file * disabledrun is now manualrun - Update to version 0.10.0+0: Added: * Russian translation * rage-keygen -y IDENTITY_FILE to convert identity files to recipients. Changed: * MSRV is now 1.65.0. * Migrated from gumdrop to clap for argument parsing. * -R/--recipients-file and -i/--identity now support "read-once" files, like those used by process substitution (-i <(other_binary get-age-identity)) and named pipes. * The filename - (hyphen) is now treated as an explicit request to read from standard input when used with -R/--recipients-file or -i/--identity. It must only occur once across the -R/--recipients-file and -i/--identity flags, and the input file. It cannot be used if the input file is omitted. Fixed: * OpenSSH private keys passed to -i/--identity that contain invalid public keys are no longer ignored when encrypting, and instead cause an error. * Weak ssh-rsa public keys that are smaller than 2048 bits are now rejected. * rage-keygen no longer overwrites existing key files with the -o/--output flag. This was its behaviour prior to 0.6.0, but was unintentionally changed when rage was modified to overwrite existing files. Key file overwriting can still be achieved by omitting -o/--output and instead piping stdout to the file. * rage-keygen now prints fatal errors directly instead of them being hidden behind the RUST_LOG=error environment variable. It also now sets its return code appropriately instead of always returning 0. - bsc#1215657 - chosen ciphertext attack possible against aes-gcm * update vendor.tar.zst to contain aes-gcm >= 0.10.3 - Update to version 0.9.2+0: * CI: Ensure apt repository is up-to-date before installing build deps * CI: Build Linux releases using ubuntu-20.04 runner * CI: Remove most uses of actions-rs actions - Update to version 0.9.2+0: * v0.9.2 * Fix changelog bugs and add missing entry * Document PINENTRY_PROGRAM environment variable * age: Add Decryptor::new_async_buffered * age: impl AsyncBufRead for ArmoredReader * Pre-initialize vectors when the capacity is known, or use arrays * Use PINENTRY_PROGRAM as environment variable for pinentry * Document why impl AsyncWrite for StreamWriter doesn't loop indefinitely * cargo update * cargo vet prune * Migrate to cargo-vet 0.7 * build(deps): bump svenstaro/upload-release-action from 2.5.0 to 2.6.1 * Correct spelling in documentation * build(deps): bump codecov/codecov-action from 3.1.1 to 3.1.4 * StreamWriter AsyncWrite: fix usage with futures::io::copy() * rage: Use Decryptor::new_buffered * age: Add Decryptor::new_buffered * age: impl BufRead for ArmoredReader * Update Homebrew formula to v0.9.1 * feat/pinentry: Use env var to define pinentry binary - As per https://en.opensuse.org/openSUSE:Package_description_guidelines mention distinctive characteristics that offset this solution from e.g. gpg. - Update to version 0.9.1+0: * ssh: Fix parsing of OpenSSH private key format * ssh: Support aes256-gcm@openssh.com ciphers for encrypted keys * ssh: Add aes256-gcm@openssh.com cipher to test cases * ssh: Extract common key material derivation logic for encrypted keys * ssh: Use associated constants for key and IV sizes * ssh: Add test cases for encrypted keys - Add shell completions for fish and zsh. - bsc#1207039 - CVE-2023-22895 - update bzip2 crate - Update of vendored dependencies - Update of vendored dependencies - Do not have the main package recommend the bash-completion sub-package, but rather have the subpackage supplement the combination of tage-encryption and bash-completion. - Update to version 0.9.0+0: * v0.9.0 * use pkcs1 crate to parse RSAPrivateKey ASN.1 object * qa: Add workflow that runs cargo vet --locked * qa: Import cargo vet audits from Firefox and zcashd * qa: Add crypto-reviewed criteria or cargo vet * qa: cargo vet init - Set minimum rust requirement to 1.59 - Update to version 0.8.1+0: * v0.8.1 * Revert updates to dashmap and indexmap * cargo update * age: Add passphrase to scrypt_work_factor_23 testkit test file * age: Reject invalid or non-canonical X25519 recipient stanzas * age: Require "contributory" behaviour for X25519 recipient stanzas * age: Add testkit test files from reference impl * Update Homebrew formula to v0.8.0 - Update to version 0.8.0+0: * v0.8.0 * age: Allow ciphertexts that encrypt the empty plaintext * Update Italian translation * Don't allow -i/--identity with passphrase-encrypted files * age: Require the last STREAM chunk to be non-empty * age: Return correct response encoding for confirm command * age: Base64-decode metadata arguments to "confirm" message * age: Extract "confirm" command handling into a helper function - Automatic update of vendored dependencies - Update to resolve bsc#1196972 CVE-2022-24713 - Regex DOS - switched to vendored_licenses_packager as build dependency - define macro "rust_tier1_arches" if undefined - Add specific lock file path to _service for cargo audit to prevent confusion with the lock files in the fuzz folders. - Update to version 0.7.1 * Fixed a bug where non-canonical recipient stanza bodies in an age file header would cause rage to crash instead of being rejected * vendor.tar.xz updated from source code Cargo.lock file - Added: * binary rage-mount * bash-completion for rage, rage-keygen and rage-mount * manual pages for rage, rage-keygen and rage-mount * Licenses files * Licenses files of vendored crates extracted with script "vendored_licenses_packager.sh" * README and CHANGELOG files * possibility to build without cargo-packaging for "older" distros - Update to version 0.7.0~git0.c93b914: * v0.7.0 * cargo update fuzz* * Update lockfiles for fuzzers * rage: Pin clap to 3.0.0-beta.2 * CI: Add bitrot check to ensure examples and benchmarks still compile * console 0.15 * age: Re-export secrecy crate * age-core: Improve crate documentation * age-core: Re-export secrecy crate * age-core: Add plugin::Error enum - Initial commit of rage
devel
c unix
2025-01-05 15:35:00 +00:00
d28ec3bef5Accepting request 1221281 from security
Ana Guerrero
2024-11-05 14:41:29 +00:00
64e2495384- Update to 0.11.0+0: Added: * Partial French translation! Fixed: * [Unix] Files can now be encrypted with rage --passphrase when piped over stdin, without requiring an explicit - argument as INPUT.
William Brown
2024-11-04 23:51:12 +00:00
22e2643e3bAccepting request 1202074 from security
Ana Guerrero
2024-09-20 15:11:53 +00:00
97153d1f30- bsc#1229959 - RUSTSEC-2024-0006 - CVE-2024-43806 - rust-shlex: Multiple issues involving quote API
William Brown
2024-09-20 04:58:28 +00:00
99b8533775Accepting request 1198787 from security
Ana Guerrero
2024-09-05 13:47:07 +00:00
0492ad4c56- bsc#1229959 - RUSTSEC-2024-0006 - rust-shlex: Multiple issues involving quote API
c unix
2024-09-04 16:04:54 +00:00
00e9499c6cAccepting request 1170229 from security
Ana Guerrero
2024-04-26 21:27:18 +00:00
538c6426f3Accepting request 1170001 from home:smolsheep:upgrades
William Brown
2024-04-26 05:55:29 +00:00
b9d7f8691bAccepting request 1113697 from security
Dominique Leuenberger
2023-09-27 22:25:11 +00:00
2c10f03d7aAccepting request 1113576 from home:firstyear:branches:security
c unix
2023-09-26 15:08:09 +00:00
2b55dd4babAccepting request 1092960 from security
Dominique Leuenberger
2023-06-14 14:29:37 +00:00
1dbbeb5dedAccepting request 1092720 from home:firstyear:branches:security
c unix
2023-06-13 16:17:18 +00:00
9e70cf5902Accepting request 1078532 from security
Dominique Leuenberger
2023-04-12 10:51:54 +00:00
547d4d8ec8Accepting request 1078412 from home:jengelh:branches:security
William Brown
2023-04-11 22:56:38 +00:00
c88223575dAccepting request 1075040 from security
Dominique Leuenberger
2023-03-29 21:27:07 +00:00
9b69fe6bddAccepting request 1074938 from home:uncomfyhalomacro:branches:security
c unix
2023-03-28 15:12:08 +00:00
b99e2d5eb4Accepting request 1058385 from security
Dominique Leuenberger
2023-01-14 19:32:49 +00:00
338878ffadAccepting request 1058092 from home:firstyear:branches:security
c unix
2023-01-14 15:37:23 +00:00
a60eef526cAccepting request 1056807 from security
Dominique Leuenberger
2023-01-08 20:25:28 +00:00
1ed9b89b8fAccepting request 1056103 from home:firstyear:branches:security
c unix
2023-01-07 17:29:18 +00:00
a3fa7be2e2Accepting request 1037423 from security
Dominique Leuenberger
2022-11-23 08:48:17 +00:00
1ac9e96fb6Accepting request 1037128 from home:dimstar:Factory
William Brown
2022-11-23 00:09:55 +00:00
3b3f9f60f9Accepting request 1032554 from security
Dominique Leuenberger
2022-11-01 12:42:56 +00:00
1b5d1b517dAccepting request 1032350 from home:firstyear:branches:security
c unix
2022-10-31 16:16:03 +00:00
243d684cecAccepting request 994832 from security
Dominique Leuenberger
2022-08-13 20:36:39 +00:00
b55e05ce56Accepting request 994831 from home:firstyear:branches:security
William Brown
2022-08-12 23:36:42 +00:00
0f6da66326Accepting request 974748 from security
Dominique Leuenberger
2022-05-04 13:10:46 +00:00
5ed5238906Accepting request 974493 from home:firstyear:branches:security
c unix
2022-05-03 17:05:25 +00:00
a7ae2bbc63Accepting request 967361 from security
Dominique Leuenberger
2022-04-06 19:52:19 +00:00
5338c321e0Accepting request 966935 from home:firstyear:branches:security
c unix
2022-04-06 15:44:34 +00:00
bc911aa3f2Accepting request 961976 from security
Dominique Leuenberger
2022-03-15 20:00:55 +00:00
44b57745c1Accepting request 961767 from home:firstyear:branches:security
c unix
2022-03-15 17:05:42 +00:00
ce578e987fAccepting request 961734 from home:cunix:security_branch
William Brown
2022-03-14 22:45:04 +00:00
85026149cfAccepting request 957468 from security
Dominique Leuenberger
2022-02-25 20:25:04 +00:00
f807e47e31Accepting request 955731 from home:firstyear:branches:security
c unix
2022-02-18 18:04:59 +00:00
e3051f847eAccepting request 952292 from security
Dominique Leuenberger
2022-02-09 19:39:05 +00:00
6ad50af872Accepting request 951794 from home:cunix:security_branch
William Brown
2022-02-08 02:32:49 +00:00
4d59b501c6Accepting request 932837 from security
Dominique Leuenberger
2021-11-22 22:04:01 +00:00
8467d9001fAccepting request 932836 from home:firstyear:branches:security
William Brown
2021-11-21 23:10:23 +00:00
724cbf600cAccepting request 932384 from home:firstyear:branches:devel:languages:rust
Johannes Segitz
2021-11-19 06:47:53 +00:00