SUSE Security Update: Security update for python
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:0223-1
Rating:             important
References:         #1122191 #984751 #985177 #985348 #989523 
                    
Cross-References:   CVE-2016-0772 CVE-2016-1000110 CVE-2016-5636
                    CVE-2016-5699 CVE-2019-5010
Affected Products:
                    SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

   An update that fixes 5 vulnerabilities is now available.

Description:

   This update for python fixes the following issues:

   Security issues fixed:

   - CVE-2016-0772: smtplib vulnerability opens startTLS stripping attack
     (bsc#984751)
   - CVE-2016-5636: heap overflow when importing malformed zip files
     (bsc#985177)
   - CVE-2016-5699: incorrect validation of HTTP headers allow header
     injection (bsc#985348)
   - CVE-2016-1000110: HTTPoxy vulnerability in urllib, fixed by disregarding
     HTTP_PROXY when REQUEST_METHOD is also set (bsc#989523)
   - CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509
     certificate parser (bsc#1122191)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-2019-223=1



Package List:

   - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):

      libpython2_7-1_0-2.7.9-16.7.2
      libpython2_7-1_0-debuginfo-2.7.9-16.7.2
      python-2.7.9-16.7.1
      python-base-2.7.9-16.7.2
      python-base-debuginfo-2.7.9-16.7.2
      python-base-debugsource-2.7.9-16.7.2
      python-curses-2.7.9-16.7.1
      python-curses-debuginfo-2.7.9-16.7.1
      python-debuginfo-2.7.9-16.7.1
      python-debugsource-2.7.9-16.7.1
      python-demo-2.7.9-16.7.1
      python-gdbm-2.7.9-16.7.1
      python-gdbm-debuginfo-2.7.9-16.7.1
      python-idle-2.7.9-16.7.1
      python-tk-2.7.9-16.7.1
      python-tk-debuginfo-2.7.9-16.7.1
      python-xml-2.7.9-16.7.2
      python-xml-debuginfo-2.7.9-16.7.2

   - SUSE Linux Enterprise Server 12-LTSS (s390x x86_64):

      libpython2_7-1_0-32bit-2.7.9-16.7.2
      libpython2_7-1_0-debuginfo-32bit-2.7.9-16.7.2
      python-32bit-2.7.9-16.7.1
      python-base-32bit-2.7.9-16.7.2
      python-base-debuginfo-32bit-2.7.9-16.7.2
      python-debuginfo-32bit-2.7.9-16.7.1

   - SUSE Linux Enterprise Server 12-LTSS (noarch):

      python-doc-2.7.9-16.7.2
      python-doc-pdf-2.7.9-16.7.2


References:

   https://www.suse.com/security/cve/CVE-2016-0772.html
   https://www.suse.com/security/cve/CVE-2016-1000110.html
   https://www.suse.com/security/cve/CVE-2016-5636.html
   https://www.suse.com/security/cve/CVE-2016-5699.html
   https://www.suse.com/security/cve/CVE-2019-5010.html
   https://bugzilla.suse.com/1122191
   https://bugzilla.suse.com/984751
   https://bugzilla.suse.com/985177
   https://bugzilla.suse.com/985348
   https://bugzilla.suse.com/989523

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2019:0223-1 important: python

February 1, 2019
An update that fixes 5 vulnerabilities is now available

Summary

This update for python fixes the following issues: Security issues fixed: - CVE-2016-0772: smtplib vulnerability opens startTLS stripping attack (bsc#984751) - CVE-2016-5636: heap overflow when importing malformed zip files (bsc#985177) - CVE-2016-5699: incorrect validation of HTTP headers allow header injection (bsc#985348) - CVE-2016-1000110: HTTPoxy vulnerability in urllib, fixed by disregarding HTTP_PROXY when REQUEST_METHOD is also set (bsc#989523) - CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2019-223=1 Package List: - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64): libpython2_7-1_0-2.7.9-16.7.2 libpython2_7-1_0-debuginfo-2.7.9-16.7.2 python-2.7.9-16.7.1 python-base-2.7.9-16.7.2 python-base-debuginfo-2.7.9-16.7.2 python-base-debugsource-2.7.9-16.7.2 python-curses-2.7.9-16.7.1 python-curses-debuginfo-2.7.9-16.7.1 python-debuginfo-2.7.9-16.7.1 python-debugsource-2.7.9-16.7.1 python-demo-2.7.9-16.7.1 python-gdbm-2.7.9-16.7.1 python-gdbm-debuginfo-2.7.9-16.7.1 python-idle-2.7.9-16.7.1 python-tk-2.7.9-16.7.1 python-tk-debuginfo-2.7.9-16.7.1 python-xml-2.7.9-16.7.2 python-xml-debuginfo-2.7.9-16.7.2 - SUSE Linux Enterprise Server 12-LTSS (s390x x86_64): libpython2_7-1_0-32bit-2.7.9-16.7.2 libpython2_7-1_0-debuginfo-32bit-2.7.9-16.7.2 python-32bit-2.7.9-16.7.1 python-base-32bit-2.7.9-16.7.2 python-base-debuginfo-32bit-2.7.9-16.7.2 python-debuginfo-32bit-2.7.9-16.7.1 - SUSE Linux Enterprise Server 12-LTSS (noarch): python-doc-2.7.9-16.7.2 python-doc-pdf-2.7.9-16.7.2

References

#1122191 #984751 #985177 #985348 #989523

Cross- CVE-2016-0772 CVE-2016-1000110 CVE-2016-5636

CVE-2016-5699 CVE-2019-5010

Affected Products:

SUSE Linux Enterprise Server 12-LTSS

https://www.suse.com/security/cve/CVE-2016-0772.html

https://www.suse.com/security/cve/CVE-2016-1000110.html

https://www.suse.com/security/cve/CVE-2016-5636.html

https://www.suse.com/security/cve/CVE-2016-5699.html

https://www.suse.com/security/cve/CVE-2019-5010.html

https://bugzilla.suse.com/1122191

https://bugzilla.suse.com/984751

https://bugzilla.suse.com/985177

https://bugzilla.suse.com/985348

https://bugzilla.suse.com/989523

Severity
Announcement ID: SUSE-SU-2019:0223-1
Rating: important

Related News