SUSE Security Update: Security update for python36
______________________________________________________________________________

Announcement ID:    SUSE-SU-2020:2216-1
Rating:             important
References:         #1173274 #1174091 
Cross-References:   CVE-2019-20907 CVE-2020-14422
Affected Products:
                    SUSE Linux Enterprise Server 12-SP5
______________________________________________________________________________

   An update that fixes two vulnerabilities is now available.

Description:

   This update for python36 fixes the following issues:

   - CVE-2019-20907, bsc#1174091: avoiding possible infinite loop in
     specifically crafted tarball.
   - CVE-2020-14422, bsc#1173274: where hash collisions in IPv4Interface and
     IPv6Interface could lead to DOS.


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP5:

      zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-2216=1



Package List:

   - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):

      libpython3_6m1_0-3.6.10-4.17.1
      libpython3_6m1_0-debuginfo-3.6.10-4.17.1
      python36-3.6.10-4.17.1
      python36-base-3.6.10-4.17.1
      python36-base-debuginfo-3.6.10-4.17.1
      python36-base-debugsource-3.6.10-4.17.1
      python36-debuginfo-3.6.10-4.17.1
      python36-debugsource-3.6.10-4.17.1


References:

   https://www.suse.com/security/cve/CVE-2019-20907.html
   https://www.suse.com/security/cve/CVE-2020-14422.html
   https://bugzilla.suse.com/1173274
   https://bugzilla.suse.com/1174091

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2020:2216-1 important: python36

August 12, 2020
An update that fixes two vulnerabilities is now available

Summary

This update for python36 fixes the following issues: - CVE-2019-20907, bsc#1174091: avoiding possible infinite loop in specifically crafted tarball. - CVE-2020-14422, bsc#1173274: where hash collisions in IPv4Interface and IPv6Interface could lead to DOS. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-2216=1 Package List: - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): libpython3_6m1_0-3.6.10-4.17.1 libpython3_6m1_0-debuginfo-3.6.10-4.17.1 python36-3.6.10-4.17.1 python36-base-3.6.10-4.17.1 python36-base-debuginfo-3.6.10-4.17.1 python36-base-debugsource-3.6.10-4.17.1 python36-debuginfo-3.6.10-4.17.1 python36-debugsource-3.6.10-4.17.1

References

#1173274 #1174091

Cross- CVE-2019-20907 CVE-2020-14422

Affected Products:

SUSE Linux Enterprise Server 12-SP5

https://www.suse.com/security/cve/CVE-2019-20907.html

https://www.suse.com/security/cve/CVE-2020-14422.html

https://bugzilla.suse.com/1173274

https://bugzilla.suse.com/1174091

Severity
Announcement ID: SUSE-SU-2020:2216-1
Rating: important

Related News