SUSE-SU-2015:1344-1: moderate: Security update for python
    sle-updates at lists.suse.com 
    sle-updates at lists.suse.com
       
    Tue Aug  4 07:09:06 MDT 2015
    
    
  
   SUSE Security Update: Security update for python
______________________________________________________________________________
Announcement ID:    SUSE-SU-2015:1344-1
Rating:             moderate
References:         #898572 #901715 #924312 #935856 
Cross-References:   CVE-2013-1752 CVE-2013-1753 CVE-2014-4650
                    CVE-2014-7185
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 12
                    SUSE Linux Enterprise Software Development Kit 12
                    SUSE Linux Enterprise Server 12
                    SUSE Linux Enterprise Desktop 12
______________________________________________________________________________
   An update that fixes four vulnerabilities is now available.
Description:
   This update to python 2.7.9 fixes the following issues:
   * python-2.7-libffi-aarch64.patch: Fix argument passing in libffi for
     aarch64
   From the version update to 2.7.9:
     * contains full backport of ssl module from Python 3.4 (PEP466)
     * HTTPS certificate validation enabled by default (PEP476)
     * SSLv3 disabled by default (bnc#901715)
     * backported ensurepip module (PEP477)
     * fixes several missing CVEs from last release: CVE-2013-1752,
       CVE-2013-1753
     * dropped upstreamed patches: python-2.7.6-poplib.patch,
       smtplib_maxline-2.7.patch, xmlrpc_gzip_27.patch
     * dropped patch python-2.7.3-ssl_ca_path.patch because we don't need it
       with ssl module from Python 3
     * libffi was upgraded upstream, seems to contain our changes, so
       dropping libffi-ppc64le.diff as well
     * python-2.7-urllib2-localnet-ssl.patch - properly remove unconditional
       "import ssl" from test_urllib2_localnet that caused it to fail without
       ssl
     * skip test_thread in qemu_linux_user mode
   From the version update to 2.7.8:
     * fixes CVE-2014-4650 directory traversal in CGIHTTPServer
     * fixes CVE-2014-7185 (bnc#898572) potential buffer overflow in buffer()
   Also the DH parameters were increased to 2048 bit to fix logjam security
   issue (bsc#935856)
Patch Instructions:
   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:
   - SUSE Linux Enterprise Workstation Extension 12:
      zypper in -t patch SUSE-SLE-WE-12-2015-367=1
   - SUSE Linux Enterprise Software Development Kit 12:
      zypper in -t patch SUSE-SLE-SDK-12-2015-367=1
   - SUSE Linux Enterprise Server 12:
      zypper in -t patch SUSE-SLE-SERVER-12-2015-367=1
   - SUSE Linux Enterprise Desktop 12:
      zypper in -t patch SUSE-SLE-DESKTOP-12-2015-367=1
   To bring your system up-to-date, use "zypper patch".
Package List:
   - SUSE Linux Enterprise Workstation Extension 12 (x86_64):
      python-base-debuginfo-2.7.9-14.1
      python-base-debugsource-2.7.9-14.1
      python-devel-2.7.9-14.1
   - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):
      python-base-debuginfo-2.7.9-14.1
      python-base-debugsource-2.7.9-14.1
      python-devel-2.7.9-14.1
   - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
      libpython2_7-1_0-2.7.9-14.1
      libpython2_7-1_0-debuginfo-2.7.9-14.1
      python-2.7.9-14.1
      python-base-2.7.9-14.1
      python-base-debuginfo-2.7.9-14.1
      python-base-debugsource-2.7.9-14.1
      python-curses-2.7.9-14.1
      python-curses-debuginfo-2.7.9-14.1
      python-debuginfo-2.7.9-14.1
      python-debugsource-2.7.9-14.1
      python-demo-2.7.9-14.1
      python-gdbm-2.7.9-14.1
      python-gdbm-debuginfo-2.7.9-14.1
      python-idle-2.7.9-14.1
      python-tk-2.7.9-14.1
      python-tk-debuginfo-2.7.9-14.1
      python-xml-2.7.9-14.1
      python-xml-debuginfo-2.7.9-14.1
   - SUSE Linux Enterprise Server 12 (s390x x86_64):
      libpython2_7-1_0-32bit-2.7.9-14.1
      libpython2_7-1_0-debuginfo-32bit-2.7.9-14.1
      python-32bit-2.7.9-14.1
      python-base-32bit-2.7.9-14.1
      python-base-debuginfo-32bit-2.7.9-14.1
      python-debuginfo-32bit-2.7.9-14.1
   - SUSE Linux Enterprise Server 12 (noarch):
      python-doc-2.7.9-14.3
      python-doc-pdf-2.7.9-14.3
   - SUSE Linux Enterprise Desktop 12 (x86_64):
      libpython2_7-1_0-2.7.9-14.1
      libpython2_7-1_0-32bit-2.7.9-14.1
      libpython2_7-1_0-debuginfo-2.7.9-14.1
      libpython2_7-1_0-debuginfo-32bit-2.7.9-14.1
      python-2.7.9-14.1
      python-base-2.7.9-14.1
      python-base-debuginfo-2.7.9-14.1
      python-base-debuginfo-32bit-2.7.9-14.1
      python-base-debugsource-2.7.9-14.1
      python-curses-2.7.9-14.1
      python-curses-debuginfo-2.7.9-14.1
      python-debuginfo-2.7.9-14.1
      python-debugsource-2.7.9-14.1
      python-devel-2.7.9-14.1
      python-tk-2.7.9-14.1
      python-tk-debuginfo-2.7.9-14.1
      python-xml-2.7.9-14.1
      python-xml-debuginfo-2.7.9-14.1
References:
   https://www.suse.com/security/cve/CVE-2013-1752.html
   https://www.suse.com/security/cve/CVE-2013-1753.html
   https://www.suse.com/security/cve/CVE-2014-4650.html
   https://www.suse.com/security/cve/CVE-2014-7185.html
   https://bugzilla.suse.com/898572
   https://bugzilla.suse.com/901715
   https://bugzilla.suse.com/924312
   https://bugzilla.suse.com/935856
    
    
More information about the sle-updates
mailing list