zsoobhan / prometheus

Ziyad Soobhan's personal website
MIT License
0 stars 0 forks source link

Bump ecdsa from 0.11 to 0.13.3 in /www/deploy #27

Closed dependabot[bot] closed 4 years ago

dependabot[bot] commented 4 years ago

Bumps ecdsa from 0.11 to 0.13.3.

Release notes

Sourced from ecdsa's releases.

ecdsa 0.13.3

Fix CVE-2019-14853 - possible DoS caused by malformed signature decoding Fix CVE-2019-14859 - signature malleability caused by insufficient checks of DER encoding

Also harden key decoding from string and DER encodings.

ecdsa 0.13.2

Restore compatibility of setup.py with Python 2.6 and 2.7.

ecdsa 0.13.1

Fix the PyPI wheel - the old version included .pyc files.

ecdsa 0.13

Fix the argument order for Curve constructor (put openssl_name= at the end,
with a default value) to unbreak compatibility with external callers who used
the 0.11 convention.

ecdsa 0.12

Switch to Versioneer for version-string management (fixing the broken ecdsa.__version__ attribute). Add Curve.openssl_name property. Mention secp256k1 in README, test against OpenSSL. Produce "wheel" distributions. Add py3.4 and pypy3 compatibility testing. Other minor fixes.

Changelog

Sourced from ecdsa's changelog.

  • Release 0.15 (02 Jan 2020)

Bug fixes: from curves import * will now correctly import BRAINPOOLP256r1 and BRAINPOOLP320r1 curves.

New features: ECDH operations have a public explicit API. Large hashes are now supported with small curves (e.g. SHA-256 can be used with NIST192p). VerifyingKey now supports the precompute() method to further speed up signature verification with the given instance of the key.

New API: VerifyingKey, SigningKey, Public_key, Private_key and CurveFp now have __eq__ methods. ecdsa.ecdh module and ECDH class. PointJacobi added. VerifyingKey.verify_digest, SigningKey.sign_digest and SigningKey.sign_digest_deterministic methods now accept allow_truncate argument to enable use of hashes larger than the curve order. VerifyingKey from_pem and from_der now accept hashfunc parameter like other from* methods. VerifyingKey has precompute method now. VerifyingKey.from_public_point may now not perform validation of public point when validate_point=False argument is passed to method. CurveFp constructor now accepts the h parameter - the cofactor of the elliptic curve, it's used for selection of algorithm of public point verification.

Performance: randrange now will now perform much fewer calls to system random number generator. PointJacobi introduced and used as the underlying implementation; speeds up the library by a factor of about 20. Library has now optional dependencies on gmpy and gmpy2. When they are availbale, the elliptic curve calculations will be about 3 times faster.

Maintenance: expected minimum version of six module (1.9.0) is now specified explicitly in setup.py and tested against. Significantly faster test suite execution.

  • Release 0.14.1 (06 Nov 2019)

Remove the obsolete six.py file from wheel

  • Release 0.14 (06 Nov 2019)

Bug fixes:

... (truncated)
Commits
  • 7add221 update NEWS file for 0.13.3
  • 5c4c74a Merge pull request #124 from tomato42/backport-sig-decode
  • 1eb2c04 update README with error handling of from_string() and from_der()
  • b95be03 execute also new tests in Travis
  • 99c907d harden also key decoding
  • 3427fa2 ensure that the encoding is actually the minimal one for length and integer
  • 563d2ee make variable names in remove_integer more aproppriate
  • 14abfe0 explicitly specify the distro to get py26 and py33
  • 9080d1d fix length decoding
  • 897178c give the same handling to string encoded signatures as to DER
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) - `@dependabot use these labels` will set the current labels as the default for future PRs for this repo and language - `@dependabot use these reviewers` will set the current reviewers as the default for future PRs for this repo and language - `@dependabot use these assignees` will set the current assignees as the default for future PRs for this repo and language - `@dependabot use this milestone` will set the current milestone as the default for future PRs for this repo and language You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/zsoobhan/prometheus/network/alerts).