Compare commits
No commits in common. "c8" and "imports/c8s/python-cryptography-3.2.1-4.el8" have entirely different histories.
c8
...
imports/c8
@ -1,42 +0,0 @@
|
|||||||
From 94a50a9731f35405f0357fa5f3b177d46a726ab3 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Alex Gaynor <alex.gaynor@gmail.com>
|
|
||||||
Date: Tue, 31 Jan 2023 08:33:54 -0500
|
|
||||||
Subject: [PATCH] Don't allow update_into to mutate immutable objects
|
|
||||||
|
|
||||||
---
|
|
||||||
src/cryptography/hazmat/backends/openssl/ciphers.py | 2 +-
|
|
||||||
tests/hazmat/primitives/test_ciphers.py | 8 ++++++++
|
|
||||||
2 files changed, 9 insertions(+), 1 deletion(-)
|
|
||||||
|
|
||||||
diff --git a/src/cryptography/hazmat/backends/openssl/ciphers.py b/src/cryptography/hazmat/backends/openssl/ciphers.py
|
|
||||||
index 286583f9325..075d68fb905 100644
|
|
||||||
--- a/src/cryptography/hazmat/backends/openssl/ciphers.py
|
|
||||||
+++ b/src/cryptography/hazmat/backends/openssl/ciphers.py
|
|
||||||
@@ -156,7 +156,7 @@ def update_into(self, data: bytes, buf: bytes) -> int:
|
|
||||||
data_processed = 0
|
|
||||||
total_out = 0
|
|
||||||
outlen = self._backend._ffi.new("int *")
|
|
||||||
- baseoutbuf = self._backend._ffi.from_buffer(buf)
|
|
||||||
+ baseoutbuf = self._backend._ffi.from_buffer(buf, require_writable=True)
|
|
||||||
baseinbuf = self._backend._ffi.from_buffer(data)
|
|
||||||
|
|
||||||
while data_processed != total_data_len:
|
|
||||||
diff --git a/tests/hazmat/primitives/test_ciphers.py b/tests/hazmat/primitives/test_ciphers.py
|
|
||||||
index 02127dd9cab..bf3b047dec2 100644
|
|
||||||
--- a/tests/hazmat/primitives/test_ciphers.py
|
|
||||||
+++ b/tests/hazmat/primitives/test_ciphers.py
|
|
||||||
@@ -318,6 +318,14 @@ def test_update_into_buffer_too_small(self, backend):
|
|
||||||
with pytest.raises(ValueError):
|
|
||||||
encryptor.update_into(b"testing", buf)
|
|
||||||
|
|
||||||
+ def test_update_into_immutable(self, backend):
|
|
||||||
+ key = b"\x00" * 16
|
|
||||||
+ c = ciphers.Cipher(AES(key), modes.ECB(), backend)
|
|
||||||
+ encryptor = c.encryptor()
|
|
||||||
+ buf = b"\x00" * 32
|
|
||||||
+ with pytest.raises((TypeError, BufferError)):
|
|
||||||
+ encryptor.update_into(b"testing", buf)
|
|
||||||
+
|
|
||||||
@pytest.mark.supported(
|
|
||||||
only_if=lambda backend: backend.cipher_supported(
|
|
||||||
AES(b"\x00" * 16), modes.GCM(b"\x00" * 12)
|
|
@ -1,45 +0,0 @@
|
|||||||
From 66cb448876b1e95b637461d13560b970bae09e08 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Alex Gaynor <alex.gaynor@gmail.com>
|
|
||||||
Date: Wed, 22 Nov 2023 16:49:56 -0500
|
|
||||||
Subject: [PATCH] Fixed crash when loading a PKCS#7 bundle with no certificates
|
|
||||||
|
|
||||||
---
|
|
||||||
src/cryptography/hazmat/backends/openssl/backend.py | 5 ++++-
|
|
||||||
tests/hazmat/primitives/test_pkcs7.py | 6 ++++++
|
|
||||||
2 files changed, 10 insertions(+), 1 deletion(-)
|
|
||||||
|
|
||||||
diff --git a/src/cryptography/hazmat/backends/openssl/backend.py b/src/cryptography/hazmat/backends/openssl/backend.py
|
|
||||||
index 7c08862b307..adfd7aefe5f 100644
|
|
||||||
--- a/src/cryptography/hazmat/backends/openssl/backend.py
|
|
||||||
+++ b/src/cryptography/hazmat/backends/openssl/backend.py
|
|
||||||
@@ -1111,9 +1111,12 @@ def _load_pkcs7_certificates(self, p7) -> list[x509.Certificate]:
|
|
||||||
_Reasons.UNSUPPORTED_SERIALIZATION,
|
|
||||||
)
|
|
||||||
|
|
||||||
+ certs: list[x509.Certificate] = []
|
|
||||||
+ if p7.d.sign == self._ffi.NULL:
|
|
||||||
+ return certs
|
|
||||||
+
|
|
||||||
sk_x509 = p7.d.sign.cert
|
|
||||||
num = self._lib.sk_X509_num(sk_x509)
|
|
||||||
- certs = []
|
|
||||||
for i in range(num):
|
|
||||||
x509 = self._lib.sk_X509_value(sk_x509, i)
|
|
||||||
self.openssl_assert(x509 != self._ffi.NULL)
|
|
||||||
diff --git a/tests/hazmat/primitives/test_pkcs7.py b/tests/hazmat/primitives/test_pkcs7.py
|
|
||||||
index ceb84e5fb48..434a361057f 100644
|
|
||||||
--- a/tests/hazmat/primitives/test_pkcs7.py
|
|
||||||
+++ b/tests/hazmat/primitives/test_pkcs7.py
|
|
||||||
@@ -89,6 +89,12 @@ def test_load_pkcs7_unsupported_type(self, backend):
|
|
||||||
mode="rb",
|
|
||||||
)
|
|
||||||
|
|
||||||
+ def test_load_pkcs7_empty_certificates(self):
|
|
||||||
+ der = b"\x30\x0B\x06\x09\x2A\x86\x48\x86\xF7\x0D\x01\x07\x02"
|
|
||||||
+
|
|
||||||
+ certificates = pkcs7.load_der_pkcs7_certificates(der)
|
|
||||||
+ assert certificates == []
|
|
||||||
+
|
|
||||||
|
|
||||||
# We have no public verification API and won't be adding one until we get
|
|
||||||
# some requirements from users so this function exists to give us basic
|
|
@ -1,12 +1,10 @@
|
|||||||
%{!?python3_pkgversion:%global python3_pkgversion 3}
|
%{!?python3_pkgversion:%global python3_pkgversion 3}
|
||||||
|
|
||||||
%global srcname cryptography
|
%global srcname cryptography
|
||||||
# rhbz#2172416: from_buffer(..., require_writable=True)
|
|
||||||
%global cffi_version 1.11.5-6
|
|
||||||
|
|
||||||
Name: python-%{srcname}
|
Name: python-%{srcname}
|
||||||
Version: 3.2.1
|
Version: 3.2.1
|
||||||
Release: 8%{?dist}
|
Release: 4%{?dist}
|
||||||
Summary: PyCA's cryptography library
|
Summary: PyCA's cryptography library
|
||||||
|
|
||||||
Group: Development/Libraries
|
Group: Development/Libraries
|
||||||
@ -19,9 +17,6 @@ Patch0002: 0002-Support-pytest-3.4.2.patch
|
|||||||
Patch0003: 0003-Skip-iso8601-test-cases.patch
|
Patch0003: 0003-Skip-iso8601-test-cases.patch
|
||||||
Patch0004: 0004-Revert-remove-NPN-bindings.patch
|
Patch0004: 0004-Revert-remove-NPN-bindings.patch
|
||||||
Patch0005: 0005-CVE-2020-36242.patch
|
Patch0005: 0005-CVE-2020-36242.patch
|
||||||
# https://github.com/pyca/cryptography/pull/8230
|
|
||||||
Patch0006: 0006-CVE-2023-23931.patch
|
|
||||||
Patch0007: 0008-CVE-2023-49083.patch
|
|
||||||
|
|
||||||
BuildRequires: openssl-devel
|
BuildRequires: openssl-devel
|
||||||
BuildRequires: gcc
|
BuildRequires: gcc
|
||||||
@ -34,7 +29,7 @@ BuildRequires: python%{python3_pkgversion}-pretend
|
|||||||
BuildRequires: python%{python3_pkgversion}-cryptography-vectors = %{version}
|
BuildRequires: python%{python3_pkgversion}-cryptography-vectors = %{version}
|
||||||
BuildRequires: python%{python3_pkgversion}-pytz
|
BuildRequires: python%{python3_pkgversion}-pytz
|
||||||
BuildRequires: python%{python3_pkgversion}-six >= 1.4.1
|
BuildRequires: python%{python3_pkgversion}-six >= 1.4.1
|
||||||
BuildRequires: python%{python3_pkgversion}-cffi >= %{cffi_version}
|
BuildRequires: python%{python3_pkgversion}-cffi >= 1.7
|
||||||
|
|
||||||
%description
|
%description
|
||||||
cryptography is a package designed to expose cryptographic primitives and
|
cryptography is a package designed to expose cryptographic primitives and
|
||||||
@ -47,7 +42,7 @@ Summary: PyCA's cryptography library
|
|||||||
|
|
||||||
Requires: openssl-libs
|
Requires: openssl-libs
|
||||||
Requires: python%{python3_pkgversion}-six >= 1.4.1
|
Requires: python%{python3_pkgversion}-six >= 1.4.1
|
||||||
Requires: python%{python3_pkgversion}-cffi >= %{cffi_version}
|
Requires: python%{python3_pkgversion}-cffi >= 1.7
|
||||||
Conflicts: python%{python3_pkgversion}-cryptography-vectors < %{version}
|
Conflicts: python%{python3_pkgversion}-cryptography-vectors < %{version}
|
||||||
Conflicts: python%{python3_pkgversion}-cryptography-vectors > %{version}
|
Conflicts: python%{python3_pkgversion}-cryptography-vectors > %{version}
|
||||||
|
|
||||||
@ -76,9 +71,7 @@ find . -name .keep -print -delete
|
|||||||
rm -f tests/hazmat/primitives/test_padding.py
|
rm -f tests/hazmat/primitives/test_padding.py
|
||||||
# don't run hypothesis tests
|
# don't run hypothesis tests
|
||||||
rm -rf tests/hypothesis
|
rm -rf tests/hypothesis
|
||||||
PYTHONPATH=%{buildroot}%{python3_sitearch} \
|
PYTHONPATH=%{buildroot}%{python3_sitearch} %{__python3} -m pytest
|
||||||
%{__python3} -m pytest \
|
|
||||||
-k "not test_decrypt_invalid_decrypt"
|
|
||||||
|
|
||||||
|
|
||||||
%files -n python%{python3_pkgversion}-%{srcname}
|
%files -n python%{python3_pkgversion}-%{srcname}
|
||||||
@ -89,20 +82,6 @@ PYTHONPATH=%{buildroot}%{python3_sitearch} \
|
|||||||
|
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
* Wed Jul 02 2025 Francisco Triviño <ftrivino@redhat.com> - 3.2.1-8
|
|
||||||
- Fix CVE-2023-49083: NULL-dereference when loading PKCS7 certificates,
|
|
||||||
resolves RHEL-97452
|
|
||||||
|
|
||||||
* Fri Dec 01 2023 Christian Heimes <cheimes@redhat.com> - 3.2.1-7
|
|
||||||
- Fix FTBFS caused by rsa_pkcs1_implicit_rejection OpenSSL feature, resolves: RHEL-17873
|
|
||||||
|
|
||||||
* Wed Feb 22 2023 Christian Heimes <cheimes@redhat.com> - 3.2.1-6
|
|
||||||
- Fix CVE-2023-23931: Don't allow update_into to mutate immutable objects, resolves rhbz#2172404
|
|
||||||
|
|
||||||
* Tue Jun 08 2021 Christian Heimes <cheimes@redhat.com> - 3.2.1-5
|
|
||||||
- Rebuild for RHEL 8.5
|
|
||||||
- Resolves: rhbz#1933071
|
|
||||||
|
|
||||||
* Tue Feb 09 2021 Christian Heimes <cheimes@redhat.com> - 3.2.1-4
|
* Tue Feb 09 2021 Christian Heimes <cheimes@redhat.com> - 3.2.1-4
|
||||||
- CVE-2020-36242: Fixed a bug where certain sequences of update() calls
|
- CVE-2020-36242: Fixed a bug where certain sequences of update() calls
|
||||||
when symmetrically encrypting very large payloads (>2GB) could result
|
when symmetrically encrypting very large payloads (>2GB) could result
|
||||||
|
Loading…
Reference in New Issue
Block a user