SUSE-RU-2022:2355-1: moderate: Recommended update for python-cryptography
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Mon Jul 11 16:16:09 UTC 2022
SUSE Recommended Update: Recommended update for python-cryptography
______________________________________________________________________________
Announcement ID: SUSE-RU-2022:2355-1
Rating: moderate
References: #1198331 PM-3445
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that has one recommended fix and contains one
feature can now be installed.
Description:
This update for python-cryptography fixes the following issues:
python-cryptography was updated to 3.3.2.
update to 3.3.0:
* BACKWARDS INCOMPATIBLE: The GCM and AESGCM now require 64-bit to
1024-bit (8 byte to 128 byte) initialization vectors. This change is to
conform with an upcoming OpenSSL release that will no longer support
sizes outside this window.
* BACKWARDS INCOMPATIBLE: When deserializing asymmetric keys we now raise
ValueError rather than UnsupportedAlgorithm when an unsupported cipher
is used. This change is to conform with an upcoming OpenSSL release that
will no longer distinguish between error types.
* BACKWARDS INCOMPATIBLE: We no longer allow loading of finite field
Diffie-Hellman parameters of less than 512 bits in length. This change
is to conform with an upcoming OpenSSL release that no longer supports
smaller sizes. These keys were already wildly insecure and should not
have been used in any application outside of testing.
* Added the recover_data_from_signature() function to RSAPublicKey for
recovering the signed data from an RSA signature.
Update to 3.2.1:
Disable blinding on RSA public keys to address an error with some versions
of OpenSSL.
update to 3.2 (bsc#1178168, CVE-2020-25659):
* CVE-2020-25659: Attempted to make RSA PKCS#1v1.5 decryption more
constant time, to protect against Bleichenbacher vulnerabilities. Due to
limitations imposed by our API, we cannot completely mitigate this
vulnerability.
* Added basic support for PKCS7 signing (including SMIME) via
PKCS7SignatureBuilder.
update to 3.1:
* **BACKWARDS INCOMPATIBLE:** Removed support for ``idna`` based
:term:`U-label` parsing in various X.509 classes. This support was
originally deprecated in version 2.1 and moved to an extra in 2.5.
* ``backend`` arguments to functions are no longer required and the
default backend will automatically be selected if no ``backend`` is
provided.
* Added initial support for parsing certificates from PKCS7 files with
:func:`~cryptography.hazmat.primitives.serialization.pkcs7.load_pem_pkcs7_c
ertificates` and
:func:`~cryptography.hazmat.primitives.serialization.pkcs7.load_der_pkcs7_c
ertificates` .
* Calling ``update`` or ``update_into`` on
:class:`~cryptography.hazmat.primitives.ciphers.CipherContext` with
``data`` longer than 2\ :sup:`31` bytes no longer raises an
``OverflowError``. This also resolves the same issue in :doc:`/fernet`.
update to 3.0:
* RSA generate_private_key() no longer accepts public_exponent values
except 65537 and 3 (the latter for legacy purposes).
* X.509 certificate parsing now enforces that the version field contains a
valid value, rather than deferring this check until version is accessed.
* Deprecated support for Python 2
* Added support for OpenSSH serialization format for ec, ed25519, rsa and
dsa private keys: load_ssh_private_key() for loading and OpenSSH for
writing.
* Added support for OpenSSH certificates to load_ssh_public_key().
* Added encrypt_at_time() and decrypt_at_time() to Fernet.
* Added support for the SubjectInformationAccess X.509 extension.
* Added support for parsing SignedCertificateTimestamps in OCSP responses.
* Added support for parsing attributes in certificate signing requests via
get_attribute_for_oid().
* Added support for encoding attributes in certificate signing requests
via add_attribute().
* On OpenSSL 1.1.1d and higher cryptography now uses OpenSSLâs built-in
CSPRNG instead of its own OS random engine because these versions of
OpenSSL properly reseed on fork.
* Added initial support for creating PKCS12 files with
serialize_key_and_certificates().
Update to 2.9:
* BACKWARDS INCOMPATIBLE: Support for Python 3.4 has been removed due to
low usage and maintenance burden.
* BACKWARDS INCOMPATIBLE: Support for OpenSSL 1.0.1 has been removed.
Users on older version of OpenSSL will need to upgrade.
* BACKWARDS INCOMPATIBLE: Support for LibreSSL 2.6.x has been removed.
* Removed support for calling public_bytes() with no arguments, as per
our deprecation policy. You must now pass encoding and format.
* BACKWARDS INCOMPATIBLE: Reversed the order in which rfc4514_string()
returns the RDNs as required by RFC 4514.
* Added support for parsing single_extensions in an OCSP response.
* NameAttribute values can now be empty strings.
Patch Instructions:
To install this SUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2355=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-2355=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
python-cryptography-debugsource-3.3.2-150400.16.3.1
python3-cryptography-3.3.2-150400.16.3.1
python3-cryptography-debuginfo-3.3.2-150400.16.3.1
- openSUSE Leap 15.4 (noarch):
python3-cryptography-vectors-3.3.2-150400.7.3.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
python-cryptography-debugsource-3.3.2-150400.16.3.1
python3-cryptography-3.3.2-150400.16.3.1
python3-cryptography-debuginfo-3.3.2-150400.16.3.1
References:
https://bugzilla.suse.com/1198331
More information about the sle-updates
mailing list