SUSE-SU-2015:1344-1: moderate: Security update for python

sle-updates at lists.suse.com sle-updates at lists.suse.com
Tue Aug 4 07:09:06 MDT 2015


   SUSE Security Update: Security update for python
______________________________________________________________________________

Announcement ID:    SUSE-SU-2015:1344-1
Rating:             moderate
References:         #898572 #901715 #924312 #935856 
Cross-References:   CVE-2013-1752 CVE-2013-1753 CVE-2014-4650
                    CVE-2014-7185
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 12
                    SUSE Linux Enterprise Software Development Kit 12
                    SUSE Linux Enterprise Server 12
                    SUSE Linux Enterprise Desktop 12
______________________________________________________________________________

   An update that fixes four vulnerabilities is now available.

Description:

   This update to python 2.7.9 fixes the following issues:
   * python-2.7-libffi-aarch64.patch: Fix argument passing in libffi for
     aarch64

   From the version update to 2.7.9:
     * contains full backport of ssl module from Python 3.4 (PEP466)
     * HTTPS certificate validation enabled by default (PEP476)
     * SSLv3 disabled by default (bnc#901715)
     * backported ensurepip module (PEP477)
     * fixes several missing CVEs from last release: CVE-2013-1752,
       CVE-2013-1753
     * dropped upstreamed patches: python-2.7.6-poplib.patch,
       smtplib_maxline-2.7.patch, xmlrpc_gzip_27.patch
     * dropped patch python-2.7.3-ssl_ca_path.patch because we don't need it
       with ssl module from Python 3
     * libffi was upgraded upstream, seems to contain our changes, so
       dropping libffi-ppc64le.diff as well
     * python-2.7-urllib2-localnet-ssl.patch - properly remove unconditional
       "import ssl" from test_urllib2_localnet that caused it to fail without
       ssl

     * skip test_thread in qemu_linux_user mode

   From the version update to 2.7.8:
     * fixes CVE-2014-4650 directory traversal in CGIHTTPServer
     * fixes CVE-2014-7185 (bnc#898572) potential buffer overflow in buffer()

   Also the DH parameters were increased to 2048 bit to fix logjam security
   issue (bsc#935856)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 12:

      zypper in -t patch SUSE-SLE-WE-12-2015-367=1

   - SUSE Linux Enterprise Software Development Kit 12:

      zypper in -t patch SUSE-SLE-SDK-12-2015-367=1

   - SUSE Linux Enterprise Server 12:

      zypper in -t patch SUSE-SLE-SERVER-12-2015-367=1

   - SUSE Linux Enterprise Desktop 12:

      zypper in -t patch SUSE-SLE-DESKTOP-12-2015-367=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Workstation Extension 12 (x86_64):

      python-base-debuginfo-2.7.9-14.1
      python-base-debugsource-2.7.9-14.1
      python-devel-2.7.9-14.1

   - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):

      python-base-debuginfo-2.7.9-14.1
      python-base-debugsource-2.7.9-14.1
      python-devel-2.7.9-14.1

   - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):

      libpython2_7-1_0-2.7.9-14.1
      libpython2_7-1_0-debuginfo-2.7.9-14.1
      python-2.7.9-14.1
      python-base-2.7.9-14.1
      python-base-debuginfo-2.7.9-14.1
      python-base-debugsource-2.7.9-14.1
      python-curses-2.7.9-14.1
      python-curses-debuginfo-2.7.9-14.1
      python-debuginfo-2.7.9-14.1
      python-debugsource-2.7.9-14.1
      python-demo-2.7.9-14.1
      python-gdbm-2.7.9-14.1
      python-gdbm-debuginfo-2.7.9-14.1
      python-idle-2.7.9-14.1
      python-tk-2.7.9-14.1
      python-tk-debuginfo-2.7.9-14.1
      python-xml-2.7.9-14.1
      python-xml-debuginfo-2.7.9-14.1

   - SUSE Linux Enterprise Server 12 (s390x x86_64):

      libpython2_7-1_0-32bit-2.7.9-14.1
      libpython2_7-1_0-debuginfo-32bit-2.7.9-14.1
      python-32bit-2.7.9-14.1
      python-base-32bit-2.7.9-14.1
      python-base-debuginfo-32bit-2.7.9-14.1
      python-debuginfo-32bit-2.7.9-14.1

   - SUSE Linux Enterprise Server 12 (noarch):

      python-doc-2.7.9-14.3
      python-doc-pdf-2.7.9-14.3

   - SUSE Linux Enterprise Desktop 12 (x86_64):

      libpython2_7-1_0-2.7.9-14.1
      libpython2_7-1_0-32bit-2.7.9-14.1
      libpython2_7-1_0-debuginfo-2.7.9-14.1
      libpython2_7-1_0-debuginfo-32bit-2.7.9-14.1
      python-2.7.9-14.1
      python-base-2.7.9-14.1
      python-base-debuginfo-2.7.9-14.1
      python-base-debuginfo-32bit-2.7.9-14.1
      python-base-debugsource-2.7.9-14.1
      python-curses-2.7.9-14.1
      python-curses-debuginfo-2.7.9-14.1
      python-debuginfo-2.7.9-14.1
      python-debugsource-2.7.9-14.1
      python-devel-2.7.9-14.1
      python-tk-2.7.9-14.1
      python-tk-debuginfo-2.7.9-14.1
      python-xml-2.7.9-14.1
      python-xml-debuginfo-2.7.9-14.1


References:

   https://www.suse.com/security/cve/CVE-2013-1752.html
   https://www.suse.com/security/cve/CVE-2013-1753.html
   https://www.suse.com/security/cve/CVE-2014-4650.html
   https://www.suse.com/security/cve/CVE-2014-7185.html
   https://bugzilla.suse.com/898572
   https://bugzilla.suse.com/901715
   https://bugzilla.suse.com/924312
   https://bugzilla.suse.com/935856



More information about the sle-updates mailing list