SUSE-SU-2018:3554-1: moderate: Security update for python, python-base
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Mon Oct 29 14:13:38 MDT 2018
SUSE Security Update: Security update for python, python-base
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:3554-1
Rating: moderate
References: #1086001 #1088004 #1088009 #1109663
Cross-References: CVE-2018-1000802 CVE-2018-1060 CVE-2018-1061
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP3
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Desktop 12-SP3
SUSE Enterprise Storage 5
SUSE CaaS Platform ALL
SUSE CaaS Platform 3.0
OpenStack Cloud Magnum Orchestration 7
______________________________________________________________________________
An update that solves three vulnerabilities and has one
errata is now available.
Description:
This update for python, python-base fixes the following issues:
Security issues fixed:
- CVE-2018-1000802: Prevent command injection in shutil module
(make_archive function) via passage of unfiltered user input
(bsc#1109663).
- CVE-2018-1061: Fixed DoS via regular expression backtracking in
difflib.IS_LINE_JUNK method in difflib (bsc#1088004).
- CVE-2018-1060: Fixed DoS via regular expression catastrophic
backtracking in apop() method in pop3lib (bsc#1088009).
Bug fixes:
- bsc#1086001: python tarfile uses random order.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP3:
zypper in -t patch SUSE-SLE-WE-12-SP3-2018-2520=1
- SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-2520=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2520=1
- SUSE Linux Enterprise Desktop 12-SP3:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-2520=1
- SUSE Enterprise Storage 5:
zypper in -t patch SUSE-Storage-5-2018-2520=1
- SUSE CaaS Platform ALL:
To install this update, use the SUSE CaaS Platform Velum dashboard.
It will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
- SUSE CaaS Platform 3.0:
To install this update, use the SUSE CaaS Platform Velum dashboard.
It will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
- OpenStack Cloud Magnum Orchestration 7:
zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2520=1
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP3 (x86_64):
python-base-debuginfo-2.7.13-28.16.1
python-base-debugsource-2.7.13-28.16.1
python-devel-2.7.13-28.16.1
- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):
python-base-debuginfo-2.7.13-28.16.1
python-base-debugsource-2.7.13-28.16.1
python-devel-2.7.13-28.16.1
- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):
libpython2_7-1_0-2.7.13-28.16.1
libpython2_7-1_0-debuginfo-2.7.13-28.16.1
python-2.7.13-28.16.1
python-base-2.7.13-28.16.1
python-base-debuginfo-2.7.13-28.16.1
python-base-debugsource-2.7.13-28.16.1
python-curses-2.7.13-28.16.1
python-curses-debuginfo-2.7.13-28.16.1
python-debuginfo-2.7.13-28.16.1
python-debugsource-2.7.13-28.16.1
python-demo-2.7.13-28.16.1
python-gdbm-2.7.13-28.16.1
python-gdbm-debuginfo-2.7.13-28.16.1
python-idle-2.7.13-28.16.1
python-tk-2.7.13-28.16.1
python-tk-debuginfo-2.7.13-28.16.1
python-xml-2.7.13-28.16.1
python-xml-debuginfo-2.7.13-28.16.1
- SUSE Linux Enterprise Server 12-SP3 (s390x x86_64):
libpython2_7-1_0-32bit-2.7.13-28.16.1
libpython2_7-1_0-debuginfo-32bit-2.7.13-28.16.1
python-32bit-2.7.13-28.16.1
python-base-32bit-2.7.13-28.16.1
python-base-debuginfo-32bit-2.7.13-28.16.1
python-debuginfo-32bit-2.7.13-28.16.1
- SUSE Linux Enterprise Server 12-SP3 (noarch):
python-doc-2.7.13-28.16.1
python-doc-pdf-2.7.13-28.16.1
- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
libpython2_7-1_0-2.7.13-28.16.1
libpython2_7-1_0-32bit-2.7.13-28.16.1
libpython2_7-1_0-debuginfo-2.7.13-28.16.1
libpython2_7-1_0-debuginfo-32bit-2.7.13-28.16.1
python-2.7.13-28.16.1
python-base-2.7.13-28.16.1
python-base-debuginfo-2.7.13-28.16.1
python-base-debuginfo-32bit-2.7.13-28.16.1
python-base-debugsource-2.7.13-28.16.1
python-curses-2.7.13-28.16.1
python-curses-debuginfo-2.7.13-28.16.1
python-debuginfo-2.7.13-28.16.1
python-debugsource-2.7.13-28.16.1
python-devel-2.7.13-28.16.1
python-tk-2.7.13-28.16.1
python-tk-debuginfo-2.7.13-28.16.1
python-xml-2.7.13-28.16.1
python-xml-debuginfo-2.7.13-28.16.1
- SUSE Enterprise Storage 5 (aarch64 x86_64):
python-debuginfo-2.7.13-28.16.1
python-debugsource-2.7.13-28.16.1
python-strict-tls-check-2.7.13-28.16.1
- SUSE CaaS Platform ALL (x86_64):
libpython2_7-1_0-2.7.13-28.16.1
libpython2_7-1_0-debuginfo-2.7.13-28.16.1
python-2.7.13-28.16.1
python-base-2.7.13-28.16.1
python-base-debuginfo-2.7.13-28.16.1
python-base-debugsource-2.7.13-28.16.1
python-debuginfo-2.7.13-28.16.1
python-debugsource-2.7.13-28.16.1
python-xml-2.7.13-28.16.1
python-xml-debuginfo-2.7.13-28.16.1
- SUSE CaaS Platform 3.0 (x86_64):
libpython2_7-1_0-2.7.13-28.16.1
libpython2_7-1_0-debuginfo-2.7.13-28.16.1
python-2.7.13-28.16.1
python-base-2.7.13-28.16.1
python-base-debuginfo-2.7.13-28.16.1
python-base-debugsource-2.7.13-28.16.1
python-debuginfo-2.7.13-28.16.1
python-debugsource-2.7.13-28.16.1
python-xml-2.7.13-28.16.1
python-xml-debuginfo-2.7.13-28.16.1
- OpenStack Cloud Magnum Orchestration 7 (x86_64):
libpython2_7-1_0-2.7.13-28.16.1
libpython2_7-1_0-debuginfo-2.7.13-28.16.1
python-2.7.13-28.16.1
python-base-2.7.13-28.16.1
python-base-debuginfo-2.7.13-28.16.1
python-base-debugsource-2.7.13-28.16.1
python-debuginfo-2.7.13-28.16.1
python-debugsource-2.7.13-28.16.1
python-xml-2.7.13-28.16.1
python-xml-debuginfo-2.7.13-28.16.1
References:
https://www.suse.com/security/cve/CVE-2018-1000802.html
https://www.suse.com/security/cve/CVE-2018-1060.html
https://www.suse.com/security/cve/CVE-2018-1061.html
https://bugzilla.suse.com/1086001
https://bugzilla.suse.com/1088004
https://bugzilla.suse.com/1088009
https://bugzilla.suse.com/1109663
More information about the sle-updates
mailing list