File python-pycrypto.changes of Package python-pycrypto
213
1
-------------------------------------------------------------------
2
Fri May 5 21:50:18 UTC 2017 - toddrme2178@gmail.com
3
4
- There was never a python3-crypto so don't provide it.
5
6
-------------------------------------------------------------------
7
Mon May 1 16:20:20 UTC 2017 - toddrme2178@gmail.com
8
9
- Implement single-spec version.
10
- Use Pypi source URL.
11
12
-------------------------------------------------------------------
13
Wed Jan 4 16:52:24 UTC 2017 - vuntz@suse.com
14
15
- Add CVE-2013-7459.patch: python-pycrypto: Heap buffer overflow in
16
ALGnew (bsc#1017420).
17
18
-------------------------------------------------------------------
19
Wed Apr 23 12:28:21 UTC 2014 - rschweikert@suse.com
20
21
- Include in SLE 12 (FATE #315990)
22
23
-------------------------------------------------------------------
24
Wed Nov 27 17:37:14 UTC 2013 - p.drouand@gmail.com
25
26
- Update to version 2.6.1
27
* [CVE-2013-1445] Fix PRNG not correctly reseeded in some situations.
28
In previous versions of PyCrypto, the Crypto.Random PRNG exhibits a
29
race condition that may cause forked processes to generate identical
30
sequences of 'random' numbers.
31
This is a fairly obscure bug that will (hopefully) not affect many
32
applications, but the failure scenario is pretty bad. Here is some
33
sample code that illustrates the problem:
34
from binascii import hexlify
35
import multiprocessing, pprint, time
36
import Crypto.Random
37
38
def task_main(arg):
39
a = Crypto.Random.get_random_bytes(8)
40
time.sleep(0.1)
41
b = Crypto.Random.get_random_bytes(8)
42
rdy, ack = arg
43
rdy.set()
44
ack.wait()
45
return "%s,%s" % (hexlify(a).decode(),
46
hexlify(b).decode())
47
48
n_procs = 4
49
manager = multiprocessing.Manager()
50
rdys = [manager.Event() for i in range(n_procs)]
51
acks = [manager.Event() for i in range(n_procs)]
52
Crypto.Random.get_random_bytes(1)
53
pool = multiprocessing.Pool(processes=n_procs,
54
initializer=Crypto.Random.atfork)
55
res_async = pool.map_async(task_main, zip(rdys, acks))
56
pool.close()
57
[rdy.wait() for rdy in rdys]
58
[ack.set() for ack in acks]
59
res = res_async.get()
60
pprint.pprint(sorted(res))
61
pool.join()
62
63
The output should be random, but it looked like this:
64
65
['c607803ae01aa8c0,2e4de6457a304b34',
66
'c607803ae01aa8c0,af80d08942b4c987',
67
'c607803ae01aa8c0,b0e4c0853de927c4',
68
'c607803ae01aa8c0,f0362585b3fceba4']
69
70
This release fixes the problem by resetting the rate-limiter when
71
Crypto.Random.atfork() is invoked. It also adds some tests and a
72
few related comments.
73
- Add "-fno-strict-aliasing" to CFLAGS
74
75
-------------------------------------------------------------------
76
Wed Jun 12 15:18:46 UTC 2013 - dmueller@suse.com
77
78
- add ignore-fastmath-warning.diff for SLE11 and older
79
80
-------------------------------------------------------------------
81
Wed Apr 24 06:56:10 UTC 2013 - highwaystar.ru@gmail.com
82
83
- update to 2.6
84
* [CVE-2012-2417] Fix LP#985164: insecure ElGamal key generation.
85
(thanks: Legrandin)
86
87
In the ElGamal schemes (for both encryption and signatures), g is
88
supposed to be the generator of the entire Z^*_p group. However, in
89
PyCrypto 2.5 and earlier, g is more simply the generator of a random
90
sub-group of Z^*_p.
91
92
The result is that the signature space (when the key is used for
93
signing) or the public key space (when the key is used for encryption)
94
may be greatly reduced from its expected size of log(p) bits, possibly
95
down to 1 bit (the worst case if the order of g is 2).
96
97
While it has not been confirmed, it has also been suggested that an
98
attacker might be able to use this fact to determine the private key.
99
100
Anyone using ElGamal keys should generate new keys as soon as practical.
101
102
Any additional information about this bug will be tracked at
103
https://bugs.launchpad.net/pycrypto/+bug/985164
104
105
* Huge documentation cleanup (thanks: Legrandin).
106
107
* Added more tests, including test vectors from NIST 800-38A
108
(thanks: Legrandin)
109
110
* Remove broken MODE_PGP, which never actually worked properly.
111
A new mode, MODE_OPENPGP, has been added for people wishing to write
112
OpenPGP implementations. Note that this does not implement the full
113
OpenPGP specification, only the "OpenPGP CFB mode" part of that
114
specification.
115
https://bugs.launchpad.net/pycrypto/+bug/996814
116
117
* Fix: getPrime with invalid input causes Python to abort with fatal error
118
https://bugs.launchpad.net/pycrypto/+bug/988431
119
120
* Fix: Segfaults within error-handling paths
121
(thanks: Paul Howarth & Dave Malcolm)
122
https://bugs.launchpad.net/pycrypto/+bug/934294
123
124
* Fix: Block ciphers allow empty string as IV
125
https://bugs.launchpad.net/pycrypto/+bug/997464
126
127
* Fix DevURandomRNG to work with Python3's new I/O stack.
128
(thanks: Sebastian Ramacher)
129
130
* Remove automagic dependencies on libgmp and libmpir, let the caller
131
disable them using args.
132
133
* Many other minor bug fixes and improvements (mostly thanks to Legrandin)
134
135
-------------------------------------------------------------------
136
Mon Sep 3 01:20:34 UTC 2012 - jengelh@inai.de
137
138
- Make package build on RH6-like systems
139
140
-------------------------------------------------------------------
141
Thu May 24 03:12:33 UTC 2012 - highwaystar.ru@gmail.com
142
143
- python3 package added
144
- minor spec improvement
145
146
-------------------------------------------------------------------
147
Mon Mar 12 21:03:54 UTC 2012 - saschpe@gmx.de
148
149
- Update to version 2.5:
150
* Added PKCS#1 encryption schemes (v1.5 and OAEP). We now have
151
a decent, easy-to-use non-textbook RSA implementation. Yay!
152
* Added PKCS#1 signature schemes (v1.5 and PSS). v1.5 required some
153
extensive changes to Hash modules to contain the algorithm specific
154
ASN.1 OID. To that end, we now always have a (thin) Python module to
155
hide the one in pure C.
156
* Added 2 standard Key Derivation Functions (PBKDF1 and PBKDF2).
157
* Added export/import of RSA keys in OpenSSH and PKCS#8 formats.
158
* Added password-protected export/import of RSA keys (one old method
159
for PKCS#8 PEM only).
160
* Added ability to generate RSA key pairs with configurable public
161
exponent e.
162
* Added ability to construct an RSA key pair even if only the private
163
exponent d is known, and not p and q.
164
* Added SHA-2 C source code (fully from Lorenz Quack).
165
* Unit tests for all the above.
166
* Updates to documentation (both inline and in Doc/pycrypt.rst)
167
* All of the above changes were put together by Legrandin (Thanks!)
168
* Minor bug fixes (setup.py and tests).
169
- Changes from version 2.4.1:
170
* Fix "error: Setup script exited with error: src/config.h: No such file or
171
directory" when installing via easy_install. (Sebastian Ramacher)
172
- Changes from version 2.4:
173
* Python 3 support! (Thorsten E. Behrens, Anders Sundman)
174
PyCrypto now supports every version of Python from 2.1 through 3.2.
175
* Timing-attack countermeasures in _fastmath: When built against
176
libgmp version 5 or later, we use mpz_powm_sec instead of mpz_powm.
177
This should prevent the timing attack described by Geremy Condra at
178
PyCon 2011:
179
http://blip.tv/pycon-us-videos-2009-2010-2011/pycon-2011-through-the-side-channel-timing-and-implementation-attacks-in-python-4897955
180
* New hash modules (for Python >= 2.5 only): SHA224, SHA384, and
181
SHA512 (Frédéric Bertolus)
182
* Configuration using GNU autoconf. This should help fix a bunch of
183
build issues.
184
* Support using MPIR as an alternative to GMP.
185
* Improve the test command in setup.py, by allowing tests to be
186
performed on a single sub-package or module only. (Legrandin)
187
* Fix double-decref of "counter" when Cipher object initialisation
188
fails (Ryan Kelly)
189
* Apply patches from Debian's python-crypto 2.3-3 package (Jan
190
Dittberner, Sebastian Ramacher):
191
- fix-RSA-generate-exception.patch
192
- epydoc-exclude-introspect.patch
193
- no-usr-local.patch
194
* Fix launchpad bug #702835: "Import key code is not compatible with
195
GMP library" (Legrandin)
196
* More tests, better documentation, various bugfixes.
197
198
-------------------------------------------------------------------
199
Thu Sep 1 13:04:04 UTC 2011 - saschpe@suse.de
200
201
- Set license to Python-2.0, fixes bnc#715456
202
203
-------------------------------------------------------------------
204
Wed Aug 31 16:46:21 UTC 2011 - saschpe@gmx.de
205
206
- Drop pycrypto-2.1.0-ssize.patch to fix SLE build
207
208
-------------------------------------------------------------------
209
Wed Aug 31 16:10:43 UTC 2011 - saschpe@gmx.de
210
211
- Initial version, replaces python-crypto
212
213