SUSE-SU-2012:0985-1: moderate: Security update for apache2-mod_python
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Mon Aug 13 12:08:38 MDT 2012
SUSE Security Update: Security update for apache2-mod_python
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0985-1
Rating: moderate
References: #757549
Cross-References: CVE-2012-1150
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Software Development Kit 11 SP1
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 11 SP1 for VMware
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise Server 10 SP4
SLE SDK 10 SP4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
Apache2 mod_python has been changed to enable randomized
hashes to help fixing denial of service problems by
injecting prepared values into Python hash functions.
(CVE-2012-1150)
As some Python scripts might need a known hashing order,
the old behaviour can be restored using a newly introduced
module option called
PythonRandomizeHashes
The option is default on, but can be disabled if necessary
for compatibility with above scripts.
Security Issue reference:
* CVE-2012-1150
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1150
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP2:
zypper in -t patch sdksp1-apache2-mod_python-6247
- SUSE Linux Enterprise Software Development Kit 11 SP1:
zypper in -t patch sdksp1-apache2-mod_python-6247
- SUSE Linux Enterprise Server 11 SP2:
zypper in -t patch slessp1-apache2-mod_python-6247
- SUSE Linux Enterprise Server 11 SP1 for VMware:
zypper in -t patch slessp1-apache2-mod_python-6247
- SUSE Linux Enterprise Server 11 SP1:
zypper in -t patch slessp1-apache2-mod_python-6247
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64):
apache2-mod_python-3.3.1-147.24.1
- SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 x86_64):
apache2-mod_python-3.3.1-147.24.1
- SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64):
apache2-mod_python-3.3.1-147.24.1
- SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64):
apache2-mod_python-3.3.1-147.24.1
- SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64):
apache2-mod_python-3.3.1-147.24.1
- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):
apache2-mod_python-3.1.3-60.19.1
- SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):
apache2-mod_python-3.1.3-60.19.1
References:
http://support.novell.com/security/cve/CVE-2012-1150.html
https://bugzilla.novell.com/757549
http://download.novell.com/patch/finder/?keywords=28bb91c1b76181613b0798dd122cc5ac
http://download.novell.com/patch/finder/?keywords=8949716005409529da7f83d076b78ef7
More information about the sle-updates
mailing list