Package python3-lasso-2.6.0-14.el8_10.x86_64
| Name | python3-lasso |
|---|---|
| Epoch | 0 |
| Version | 2.6.0 |
| Release | 14.el8_10 |
| Architecture | x86_64 |
| Website/URL | http://lasso.entrouvert.org/ |
| License | GPLv2+ |
| Build Time | 2025-11-18 09:34:57 |
| Build Host | builder-x86-08.inferitos.ru |
| Summary | Liberty Alliance Single Sign On (lasso) Python bindings |
| Repositories | AppStream |
| Description | Python language bindings for the lasso (Liberty Alliance Single Sign On) library. |
| Errata | — |
| Size | 190 KiB |
| Source Project | lasso-2.6.0-14.el8_10 |
| SHA-256 checksum | 77984132b99e79e0cd3b8b41e8931fbdea70868497f6f57b968196b82af2b80e |
×
* Fri Nov 14 2025 Tomas Halman <thalman@redhat.com> - 2.6.0-14
- Fixing CVE-2025-47151
Resolves: RHEL-126687 CVE-2025-47151 lasso: Type confusion in Entr'ouvert Lasso
* Wed Jul 26 2023 MSVSphere Packaging Team <packager@msvsphere.ru> - 2.6.0-13
- Rebuilt for MSVSphere 8.8
* Wed May 04 2022 Tomas Halman <thalman@redhat.com> - 2.6.0-13
- Publishing the python3-lasso binding
- Resolves: rhbz#1888195 - Release python lasso package
* Fri Jul 30 2021 Jakub Hrozek <jhrozek@redhat.com> - 2.6.0-12
- Fix a dead code issue in the signature wrapping patch
- Resolves: rhbz#1951653 - CVE-2021-28091 lasso: XML signature wrapping
vulnerability when parsing SAML responses [rhel-8]
* Mon Jun 21 2021 Jakub Hrozek <jhrozek@redhat.com> - 2.6.0-11
- Bump release to force the package through OSCI as the previous
build reached CI just in time for an outage
- Related: rhbz#1888195 - [RFE] release (built) python3-lasso pkg (comingfrom lasso)
* Fri Jun 04 2021 Jakub Hrozek <jhrozek@redhat.com> - 2.6.0-10
- Resolves: rhbz#1951653 - CVE-2021-28091 lasso: XML signature wrapping
vulnerability when parsing SAML responses [rhel-8]
* Thu May 06 2021 Jakub Hrozek <jhrozek@redhat.com> - 2.6.0-9
- Resolves: rhbz#1888195 - [RFE] release (built) python3-lasso pkg (coming
from lasso)
* Fri Oct 18 2019 Jakub Hrozek <jhrozek@redhat.com> - 2.6.0-8
- Resolves: rhbz#1730018 - lasso includes "Destination" attribute in SAML
AuthnRequest populated with SP
AssertionConsumerServiceURL when ECP workflow
is used which leads to IdP-side errors
* Fri Jun 14 2019 Jakub Hrozek <jhrozek@redhat.com> - 2.6.0-7
- Resolves: rhbz#1634268 - ECP signature check fails with
LASSO_DS_ERROR_SIGNATURE_NOT_FOUND when
assertion signed instead of response
* Thu Jun 13 2019 Jakub Hrozek <jhrozek@redhat.com> - 2.6.0-6
- Resolves: rhbz#1719020 - Expired certificate prevents tests from running