Mailinglist Archive: opensuse-updates (48 mails)
< Previous | Next > |
openSUSE-SU-2014:1041-1: moderate: update for python
- From: opensuse-security@xxxxxxxxxxxx
- Date: Wed, 20 Aug 2014 19:06:14 +0200 (CEST)
- Message-id: <20140820170614.45085321B1@maintenance.suse.de>
openSUSE Security Update: update for python
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1041-1
Rating: moderate
References: #885882
Cross-References: CVE-2014-4650
Affected Products:
openSUSE 13.1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This python update fixes the following security and no security issues:
- CGIHTTPServer file disclosure and directory traversal through
URL-encoded characters (CVE-2014-4650, bnc#885882)
- remove link count optimizations that are incorrect on btrfs (and
possibly other filesystems)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-505
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
libpython2_7-1_0-2.7.6-8.14.1
libpython2_7-1_0-debuginfo-2.7.6-8.14.1
python-2.7.6-8.14.1
python-base-2.7.6-8.14.1
python-base-debuginfo-2.7.6-8.14.1
python-base-debugsource-2.7.6-8.14.1
python-curses-2.7.6-8.14.1
python-curses-debuginfo-2.7.6-8.14.1
python-debuginfo-2.7.6-8.14.1
python-debugsource-2.7.6-8.14.1
python-demo-2.7.6-8.14.1
python-devel-2.7.6-8.14.1
python-gdbm-2.7.6-8.14.1
python-gdbm-debuginfo-2.7.6-8.14.1
python-idle-2.7.6-8.14.1
python-tk-2.7.6-8.14.1
python-tk-debuginfo-2.7.6-8.14.1
python-xml-2.7.6-8.14.1
python-xml-debuginfo-2.7.6-8.14.1
- openSUSE 13.1 (x86_64):
libpython2_7-1_0-32bit-2.7.6-8.14.1
libpython2_7-1_0-debuginfo-32bit-2.7.6-8.14.1
python-32bit-2.7.6-8.14.1
python-base-32bit-2.7.6-8.14.1
python-base-debuginfo-32bit-2.7.6-8.14.1
python-debuginfo-32bit-2.7.6-8.14.1
- openSUSE 13.1 (noarch):
python-doc-2.7.6-8.14.1
python-doc-pdf-2.7.6-8.14.1
References:
http://support.novell.com/security/cve/CVE-2014-4650.html
https://bugzilla.novell.com/885882
______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:1041-1
Rating: moderate
References: #885882
Cross-References: CVE-2014-4650
Affected Products:
openSUSE 13.1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This python update fixes the following security and no security issues:
- CGIHTTPServer file disclosure and directory traversal through
URL-encoded characters (CVE-2014-4650, bnc#885882)
- remove link count optimizations that are incorrect on btrfs (and
possibly other filesystems)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-505
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
libpython2_7-1_0-2.7.6-8.14.1
libpython2_7-1_0-debuginfo-2.7.6-8.14.1
python-2.7.6-8.14.1
python-base-2.7.6-8.14.1
python-base-debuginfo-2.7.6-8.14.1
python-base-debugsource-2.7.6-8.14.1
python-curses-2.7.6-8.14.1
python-curses-debuginfo-2.7.6-8.14.1
python-debuginfo-2.7.6-8.14.1
python-debugsource-2.7.6-8.14.1
python-demo-2.7.6-8.14.1
python-devel-2.7.6-8.14.1
python-gdbm-2.7.6-8.14.1
python-gdbm-debuginfo-2.7.6-8.14.1
python-idle-2.7.6-8.14.1
python-tk-2.7.6-8.14.1
python-tk-debuginfo-2.7.6-8.14.1
python-xml-2.7.6-8.14.1
python-xml-debuginfo-2.7.6-8.14.1
- openSUSE 13.1 (x86_64):
libpython2_7-1_0-32bit-2.7.6-8.14.1
libpython2_7-1_0-debuginfo-32bit-2.7.6-8.14.1
python-32bit-2.7.6-8.14.1
python-base-32bit-2.7.6-8.14.1
python-base-debuginfo-32bit-2.7.6-8.14.1
python-debuginfo-32bit-2.7.6-8.14.1
- openSUSE 13.1 (noarch):
python-doc-2.7.6-8.14.1
python-doc-pdf-2.7.6-8.14.1
References:
http://support.novell.com/security/cve/CVE-2014-4650.html
https://bugzilla.novell.com/885882
< Previous | Next > |