* **SECURITY ISSUE:** Fixed a bug where certain sequences of ``update()`` calls when symmetrically encrypting very large payloads (>2GB) could result in an integer overflow, leading to buffer overflows. *CVE-2020-36242*
Unable to check for sanity: > no match for package: dev-python/cryptography-3.3.2
All sanity-check issues have been resolved
x86 done
sparc done
amd64 done
ppc64 stable
arm64 done
arm done
ppc done
hppa stable
s390 done all arches done
Please cleanup.
The bug has been closed via the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=f4caeb851ad299b29220092be27856dd0e4c8d57 commit f4caeb851ad299b29220092be27856dd0e4c8d57 Author: Michał Górny <mgorny@gentoo.org> AuthorDate: 2021-04-06 06:27:39 +0000 Commit: Michał Górny <mgorny@gentoo.org> CommitDate: 2021-04-06 06:27:49 +0000 dev-python/cryptography: Remove old Closes: https://bugs.gentoo.org/769419 Signed-off-by: Michał Górny <mgorny@gentoo.org> dev-python/cryptography/Manifest | 4 -- dev-python/cryptography/cryptography-3.2.1.ebuild | 67 ----------------------- dev-python/cryptography/cryptography-3.3.1.ebuild | 67 ----------------------- 3 files changed, 138 deletions(-)
Sry, wrong tag.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/data/glsa.git/commit/?id=c64e048a91b0aa0d481f453db2b0de77a5123fc4 commit c64e048a91b0aa0d481f453db2b0de77a5123fc4 Author: GLSAMaker <glsamaker@gentoo.org> AuthorDate: 2024-07-01 05:59:02 +0000 Commit: John Helmert III <ajak@gentoo.org> CommitDate: 2024-07-01 06:09:25 +0000 [ GLSA 202407-06 ] cryptography: Multiple Vulnerabilities Bug: https://bugs.gentoo.org/769419 Bug: https://bugs.gentoo.org/864049 Bug: https://bugs.gentoo.org/893576 Bug: https://bugs.gentoo.org/918685 Bug: https://bugs.gentoo.org/925120 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: John Helmert III <ajak@gentoo.org> glsa-202407-06.xml | 49 +++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 49 insertions(+)