* **SECURITY ISSUE:** Fixed a bug where certain sequences of ``update()`` calls when symmetrically encrypting very large payloads (>2GB) could result in an integer overflow, leading to buffer overflows. *CVE-2020-36242*
Unable to check for sanity: > no match for package: dev-python/cryptography-3.3.2
All sanity-check issues have been resolved
x86 done
sparc done
amd64 done
ppc64 stable
arm64 done
arm done
ppc done
hppa stable
s390 done all arches done
Please cleanup.
The bug has been closed via the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=f4caeb851ad299b29220092be27856dd0e4c8d57 commit f4caeb851ad299b29220092be27856dd0e4c8d57 Author: Michał Górny <mgorny@gentoo.org> AuthorDate: 2021-04-06 06:27:39 +0000 Commit: Michał Górny <mgorny@gentoo.org> CommitDate: 2021-04-06 06:27:49 +0000 dev-python/cryptography: Remove old Closes: https://bugs.gentoo.org/769419 Signed-off-by: Michał Górny <mgorny@gentoo.org> dev-python/cryptography/Manifest | 4 -- dev-python/cryptography/cryptography-3.2.1.ebuild | 67 ----------------------- dev-python/cryptography/cryptography-3.3.1.ebuild | 67 ----------------------- 3 files changed, 138 deletions(-)
Sry, wrong tag.