openSUSE Security Update: Security update for python-cryptography
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2018:3445-1
Rating:             moderate
References:         #1101820 
Cross-References:   CVE-2018-10903
Affected Products:
                    openSUSE Leap 15.0
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   This update for python-cryptography fixes the following issues:

   - CVE-2018-10903: The finalize_with_tag API did not enforce a minimum tag
     length. If a user did not validate the input length prior to passing it
     to finalize_with_tag an attacker could craft an invalid payload with a
     shortened tag (e.g. 1 byte) such that they would have a 1 in 256 chance
     of passing the MAC check. GCM tag forgeries could have caused key
     leakage (bsc#1101820).

   This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.0:

      zypper in -t patch openSUSE-2018-1281=1



Package List:

   - openSUSE Leap 15.0 (i586 x86_64):

      python-cryptography-debuginfo-2.1.4-lp150.3.3.1
      python-cryptography-debugsource-2.1.4-lp150.3.3.1
      python2-cryptography-2.1.4-lp150.3.3.1
      python2-cryptography-debuginfo-2.1.4-lp150.3.3.1
      python3-cryptography-2.1.4-lp150.3.3.1
      python3-cryptography-debuginfo-2.1.4-lp150.3.3.1


References:

   https://www.suse.com/security/cve/CVE-2018-10903.html
   https://bugzilla.suse.com/1101820

-- 

openSUSE: 2018:3445-1: moderate: python-cryptography

October 25, 2018
An update that fixes one vulnerability is now available.

Description

This update for python-cryptography fixes the following issues: - CVE-2018-10903: The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the MAC check. GCM tag forgeries could have caused key leakage (bsc#1101820). This update was imported from the SUSE:SLE-15:Update update project.

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.0: zypper in -t patch openSUSE-2018-1281=1


Package List

- openSUSE Leap 15.0 (i586 x86_64): python-cryptography-debuginfo-2.1.4-lp150.3.3.1 python-cryptography-debugsource-2.1.4-lp150.3.3.1 python2-cryptography-2.1.4-lp150.3.3.1 python2-cryptography-debuginfo-2.1.4-lp150.3.3.1 python3-cryptography-2.1.4-lp150.3.3.1 python3-cryptography-debuginfo-2.1.4-lp150.3.3.1


References

https://www.suse.com/security/cve/CVE-2018-10903.html https://bugzilla.suse.com/1101820--


Severity
Announcement ID: openSUSE-SU-2018:3445-1
Rating: moderate
Affected Products: openSUSE Leap 15.0