Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2015.1344.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2015:1344-1)
Summary:The remote host is missing an update for the 'python' package(s) announced via the SUSE-SU-2015:1344-1 advisory.
Description:Summary:
The remote host is missing an update for the 'python' package(s) announced via the SUSE-SU-2015:1344-1 advisory.

Vulnerability Insight:
This update to python 2.7.9 fixes the following issues:
* python-2.7-libffi-aarch64.patch: Fix argument passing in libffi for aarch64

From the version update to 2.7.9:
* contains full backport of ssl module from Python 3.4 (PEP466)
* HTTPS certificate validation enabled by default (PEP476)
* SSLv3 disabled by default (bnc#901715)
* backported ensurepip module (PEP477)
* fixes several missing CVEs from last release: CVE-2013-1752, CVE-2013-1753
* dropped upstreamed patches: python-2.7.6-poplib.patch,
smtplib_maxline-2.7.patch, xmlrpc_gzip_27.patch
* dropped patch python-2.7.3-ssl_ca_path.patch because we don't need it
with ssl module from Python 3
* libffi was upgraded upstream, seems to contain our changes,
so dropping libffi-ppc64le.diff as well
* python-2.7-urllib2-localnet-ssl.patch - properly remove unconditional
'import ssl' from test_urllib2_localnet that caused it to fail without ssl

* skip test_thread in qemu_linux_user mode

From the version update to 2.7.8:
* fixes CVE-2014-4650 directory traversal in CGIHTTPServer
* fixes CVE-2014-7185 (bnc#898572) potential buffer overflow in buffer()

Also the DH parameters were increased to 2048 bit to fix logjam security issue (bsc#935856)

Affected Software/OS:
'python' package(s) on SUSE Linux Enterprise Desktop 12, SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server for SAP Applications 12.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-1752
Common Vulnerability Exposure (CVE) ID: CVE-2013-1753
Common Vulnerability Exposure (CVE) ID: CVE-2014-4650
http://bugs.python.org/issue21766
http://openwall.com/lists/oss-security/2014/06/26/3
RedHat Security Advisories: Red Hat
https://access.redhat.com/security/cve/cve-2014-4650
Common Vulnerability Exposure (CVE) ID: CVE-2014-7185
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
BugTraq ID: 70089
http://www.securityfocus.com/bid/70089
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139663.html
https://security.gentoo.org/glsa/201503-10
http://www.openwall.com/lists/oss-security/2014/09/23/5
http://www.openwall.com/lists/oss-security/2014/09/25/47
RedHat Security Advisories: RHSA-2015:1064
http://rhn.redhat.com/errata/RHSA-2015-1064.html
RedHat Security Advisories: RHSA-2015:1330
http://rhn.redhat.com/errata/RHSA-2015-1330.html
SuSE Security Announcement: openSUSE-SU-2014:1292 (Google Search)
http://lists.opensuse.org/opensuse-updates/2014-10/msg00016.html
XForce ISS Database: python-bufferobject-overflow(96193)
https://exchange.xforce.ibmcloud.com/vulnerabilities/96193
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.