SUSE-SU-2013:1618-1: moderate: Security update for Python
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Thu Oct 31 13:04:10 MDT 2013
SUSE Security Update: Security update for Python
______________________________________________________________________________
Announcement ID: SUSE-SU-2013:1618-1
Rating: moderate
References: #834601
Cross-References: CVE-2013-4238
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Server 11 SP2 for VMware
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Desktop 11 SP3
SUSE Linux Enterprise Desktop 11 SP2
______________________________________________________________________________
An update that fixes one vulnerability is now available. It
includes one version update.
Description:
This python update fixes a certificate hostname issue.
* bnc#834601: CVE-2013-4238: python: SSL module does
not handle certificates that contain hostnames with NULL
bytes
Security Issue reference:
* CVE-2013-4238
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP3:
zypper in -t patch sdksp3-python-201310-8405
- SUSE Linux Enterprise Software Development Kit 11 SP2:
zypper in -t patch sdksp2-python-201310-8404
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-python-201310-8405
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-python-201310-8405
- SUSE Linux Enterprise Server 11 SP2 for VMware:
zypper in -t patch slessp2-python-201310-8404
- SUSE Linux Enterprise Server 11 SP2:
zypper in -t patch slessp2-python-201310-8404
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-python-201310-8405
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp2-python-201310-8404
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):
python-devel-2.6.8-0.23.1
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):
python-demo-2.6.8-0.23.1
python-gdbm-2.6.8-0.23.1
python-idle-2.6.8-0.23.1
python-tk-2.6.8-0.23.1
- SUSE Linux Enterprise Software Development Kit 11 SP3 (x86_64):
python-32bit-2.6.8-0.23.1
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.6.8]:
python-devel-2.6.8-0.23.1
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64) [New Version: 2.6.8]:
python-demo-2.6.8-0.23.1
python-gdbm-2.6.8-0.23.1
python-idle-2.6.8-0.23.1
python-tk-2.6.8-0.23.1
- SUSE Linux Enterprise Software Development Kit 11 SP2 (x86_64) [New Version: 2.6.8]:
python-32bit-2.6.8-0.23.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
libpython2_6-1_0-2.6.8-0.23.1
python-2.6.8-0.23.1
python-base-2.6.8-0.23.1
python-curses-2.6.8-0.23.1
python-demo-2.6.8-0.23.1
python-gdbm-2.6.8-0.23.1
python-idle-2.6.8-0.23.1
python-tk-2.6.8-0.23.1
python-xml-2.6.8-0.23.1
- SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):
libpython2_6-1_0-32bit-2.6.8-0.23.1
python-32bit-2.6.8-0.23.1
python-base-32bit-2.6.8-0.23.1
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
libpython2_6-1_0-2.6.8-0.23.1
python-2.6.8-0.23.1
python-base-2.6.8-0.23.1
python-curses-2.6.8-0.23.1
python-demo-2.6.8-0.23.1
python-gdbm-2.6.8-0.23.1
python-idle-2.6.8-0.23.1
python-tk-2.6.8-0.23.1
python-xml-2.6.8-0.23.1
- SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):
libpython2_6-1_0-32bit-2.6.8-0.23.1
python-32bit-2.6.8-0.23.1
python-base-32bit-2.6.8-0.23.1
- SUSE Linux Enterprise Server 11 SP3 (ia64):
libpython2_6-1_0-x86-2.6.8-0.23.1
python-base-x86-2.6.8-0.23.1
python-x86-2.6.8-0.23.1
- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64) [New Version: 2.6.8]:
libpython2_6-1_0-2.6.8-0.23.1
python-2.6.8-0.23.1
python-base-2.6.8-0.23.1
python-curses-2.6.8-0.23.1
python-demo-2.6.8-0.23.1
python-gdbm-2.6.8-0.23.1
python-idle-2.6.8-0.23.1
python-tk-2.6.8-0.23.1
python-xml-2.6.8-0.23.1
- SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64) [New Version: 2.6.8]:
libpython2_6-1_0-32bit-2.6.8-0.23.1
python-32bit-2.6.8-0.23.1
python-base-32bit-2.6.8-0.23.1
- SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.6.8]:
libpython2_6-1_0-2.6.8-0.23.1
python-2.6.8-0.23.1
python-base-2.6.8-0.23.1
python-curses-2.6.8-0.23.1
python-demo-2.6.8-0.23.1
python-gdbm-2.6.8-0.23.1
python-idle-2.6.8-0.23.1
python-tk-2.6.8-0.23.1
python-xml-2.6.8-0.23.1
- SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64) [New Version: 2.6.8]:
libpython2_6-1_0-32bit-2.6.8-0.23.1
python-32bit-2.6.8-0.23.1
python-base-32bit-2.6.8-0.23.1
- SUSE Linux Enterprise Server 11 SP2 (ia64) [New Version: 2.6.8]:
libpython2_6-1_0-x86-2.6.8-0.23.1
python-base-x86-2.6.8-0.23.1
python-x86-2.6.8-0.23.1
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
libpython2_6-1_0-2.6.8-0.23.1
python-2.6.8-0.23.1
python-base-2.6.8-0.23.1
python-curses-2.6.8-0.23.1
python-devel-2.6.8-0.23.1
python-tk-2.6.8-0.23.1
python-xml-2.6.8-0.23.1
- SUSE Linux Enterprise Desktop 11 SP3 (x86_64):
libpython2_6-1_0-32bit-2.6.8-0.23.1
python-base-32bit-2.6.8-0.23.1
- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 2.6.8]:
libpython2_6-1_0-2.6.8-0.23.1
python-2.6.8-0.23.1
python-base-2.6.8-0.23.1
python-curses-2.6.8-0.23.1
python-devel-2.6.8-0.23.1
python-tk-2.6.8-0.23.1
python-xml-2.6.8-0.23.1
- SUSE Linux Enterprise Desktop 11 SP2 (x86_64) [New Version: 2.6.8]:
libpython2_6-1_0-32bit-2.6.8-0.23.1
python-base-32bit-2.6.8-0.23.1
References:
http://support.novell.com/security/cve/CVE-2013-4238.html
https://bugzilla.novell.com/834601
http://download.novell.com/patch/finder/?keywords=44f8e36da143c92e1f5805dabcf91e30
http://download.novell.com/patch/finder/?keywords=776be407908387f0e13fc5cac4dcdec5
More information about the sle-updates
mailing list