You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@airavata.apache.org by GitBox <gi...@apache.org> on 2022/05/17 21:01:00 UTC

[GitHub] [airavata-django-portal-sdk] dependabot[bot] opened a new pull request, #6: Bump cryptography from 3.0 to 3.3.2

dependabot[bot] opened a new pull request, #6:
URL: https://github.com/apache/airavata-django-portal-sdk/pull/6

   Bumps [cryptography](https://github.com/pyca/cryptography) from 3.0 to 3.3.2.
   <details>
   <summary>Changelog</summary>
   <p><em>Sourced from <a href="https://github.com/pyca/cryptography/blob/main/CHANGELOG.rst">cryptography's changelog</a>.</em></p>
   <blockquote>
   <p>3.3.2 - 2021-02-07</p>
   <pre><code>
   * **SECURITY ISSUE:** Fixed a bug where certain sequences of ``update()`` calls
     when symmetrically encrypting very large payloads (&gt;2GB) could result in an
     integer overflow, leading to buffer overflows. *CVE-2020-36242* **Update:**
     This fix is a workaround for *CVE-2021-23840* in OpenSSL, fixed in OpenSSL
     1.1.1j.
   <p>.. _v3-3-1:</p>
   <p>3.3.1 - 2020-12-09
   </code></pre></p>
   <ul>
   <li>Re-added a legacy symbol causing problems for older <code>pyOpenSSL</code> users.</li>
   </ul>
   <p>.. _v3-3:</p>
   <p>3.3 - 2020-12-08</p>
   <pre><code>
   * **BACKWARDS INCOMPATIBLE:** Support for Python 3.5 has been removed due to
     low usage and maintenance burden.
   * **BACKWARDS INCOMPATIBLE:** The
     :class:`~cryptography.hazmat.primitives.ciphers.modes.GCM` and
     :class:`~cryptography.hazmat.primitives.ciphers.aead.AESGCM` now require
     64-bit to 1024-bit (8 byte to 128 byte) initialization vectors. This change
     is to conform with an upcoming OpenSSL release that will no longer support
     sizes outside this window.
   * **BACKWARDS INCOMPATIBLE:** When deserializing asymmetric keys we now
     raise ``ValueError`` rather than ``UnsupportedAlgorithm`` when an
     unsupported cipher is used. This change is to conform with an upcoming
     OpenSSL release that will no longer distinguish between error types.
   * **BACKWARDS INCOMPATIBLE:** We no longer allow loading of finite field
     Diffie-Hellman parameters of less than 512 bits in length. This change is to
     conform with an upcoming OpenSSL release that no longer supports smaller
     sizes. These keys were already wildly insecure and should not have been used
     in any application outside of testing.
   * Updated Windows, macOS, and ``manylinux`` wheels to be compiled with
     OpenSSL 1.1.1i.
   * Python 2 support is deprecated in ``cryptography``. This is the last release
     that will support Python 2.
   * Added the
     :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey.recover_data_from_signature`
     function to
     :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey`
     for recovering the signed data from an RSA signature.
   <p>.. _v3-2-1:</p>
   <p>&lt;/tr&gt;&lt;/table&gt;
   </code></pre></p>
   </blockquote>
   <p>... (truncated)</p>
   </details>
   <details>
   <summary>Commits</summary>
   <ul>
   <li><a href="https://github.com/pyca/cryptography/commit/82b6ce28389f0a317bc55ba2091a74b346db7cae"><code>82b6ce2</code></a> correct buffer overflows cause by integer overflow in openssl (<a href="https://github-redirect.dependabot.com/pyca/cryptography/issues/5747">#5747</a>)</li>
   <li><a href="https://github.com/pyca/cryptography/commit/1ff0d50948bbb6f2aa53d5648f1188a567d941cd"><code>1ff0d50</code></a> re-add Cryptography_HAS_TLSEXT_HOSTNAME and bump for 3.3.1 (<a href="https://github-redirect.dependabot.com/pyca/cryptography/issues/5625">#5625</a>)</li>
   <li><a href="https://github.com/pyca/cryptography/commit/7e8fff73cf0c597fe2df34daf2027506f84b9d3b"><code>7e8fff7</code></a> Prepare for 3.3 release (<a href="https://github-redirect.dependabot.com/pyca/cryptography/issues/5603">#5603</a>)</li>
   <li><a href="https://github.com/pyca/cryptography/commit/b5278c908574b2d965755d063a95812c6b520a8e"><code>b5278c9</code></a> Fixed DH tests for latest CentOS FIPS OpenSSL (<a href="https://github-redirect.dependabot.com/pyca/cryptography/issues/5604">#5604</a>)</li>
   <li><a href="https://github.com/pyca/cryptography/commit/6693d55cbe05c98c9e1fe3a8b08639f5491a572a"><code>6693d55</code></a> Add support for RSA signature recovery (<a href="https://github-redirect.dependabot.com/pyca/cryptography/issues/5573">#5573</a>)</li>
   <li><a href="https://github.com/pyca/cryptography/commit/8686d524b7b890bcbe6132b774bd72a3ae37cf0d"><code>8686d52</code></a> Document that PKCS1v1.5 is not constant time (<a href="https://github-redirect.dependabot.com/pyca/cryptography/issues/5600">#5600</a>)</li>
   <li><a href="https://github.com/pyca/cryptography/commit/1be144acc6b46ae2ece459d80a20831ac2ac1c74"><code>1be144a</code></a> bump cffi minimum version to help out pyopenssl (<a href="https://github-redirect.dependabot.com/pyca/cryptography/issues/5598">#5598</a>)</li>
   <li><a href="https://github.com/pyca/cryptography/commit/96f2d96d1c4884a7d314372d4876e0d45e24e342"><code>96f2d96</code></a> remove legacy debugging code from setup.py (<a href="https://github-redirect.dependabot.com/pyca/cryptography/issues/5597">#5597</a>)</li>
   <li><a href="https://github.com/pyca/cryptography/commit/2660f93eca71be5558cfcb9a120310636791e6ec"><code>2660f93</code></a> Document that Firefox doesn't support unencrypted pkcs12 (<a href="https://github-redirect.dependabot.com/pyca/cryptography/issues/5596">#5596</a>)</li>
   <li><a href="https://github.com/pyca/cryptography/commit/a2096694853aed0828d0aaf38e364577a52b3780"><code>a209669</code></a> Added tls bindings for new OpenSSL APIs (<a href="https://github-redirect.dependabot.com/pyca/cryptography/issues/5595">#5595</a>)</li>
   <li>Additional commits viewable in <a href="https://github.com/pyca/cryptography/compare/3.0...3.3.2">compare view</a></li>
   </ul>
   </details>
   <br />
   
   
   [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=cryptography&package-manager=pip&previous-version=3.0&new-version=3.3.2)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)
   
   Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`.
   
   [//]: # (dependabot-automerge-start)
   [//]: # (dependabot-automerge-end)
   
   ---
   
   <details>
   <summary>Dependabot commands and options</summary>
   <br />
   
   You can trigger Dependabot actions by commenting on this PR:
   - `@dependabot rebase` will rebase this PR
   - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it
   - `@dependabot merge` will merge this PR after your CI passes on it
   - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it
   - `@dependabot cancel merge` will cancel a previously requested merge and block automerging
   - `@dependabot reopen` will reopen this PR if it is closed
   - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
   - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
   - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
   - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
   - `@dependabot use these labels` will set the current labels as the default for future PRs for this repo and language
   - `@dependabot use these reviewers` will set the current reviewers as the default for future PRs for this repo and language
   - `@dependabot use these assignees` will set the current assignees as the default for future PRs for this repo and language
   - `@dependabot use this milestone` will set the current milestone as the default for future PRs for this repo and language
   
   You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/apache/airavata-django-portal-sdk/network/alerts).
   
   </details>


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscribe@airavata.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org


[GitHub] [airavata-django-portal-sdk] machristie merged pull request #6: Bump cryptography from 3.0 to 3.3.2

Posted by GitBox <gi...@apache.org>.
machristie merged PR #6:
URL: https://github.com/apache/airavata-django-portal-sdk/pull/6


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscribe@airavata.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org