-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.2431
                        Security update for python
                              20 August 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           python
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Denial of Service               -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-1061 CVE-2018-1060 CVE-2016-5636

Reference:         ASB-2016.0108
                   ESB-2018.2291
                   ESB-2018.2222
                   ESB-2018.2098
                   ESB-2018.1709

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2018/suse-su-20182408-1.html

- --------------------------BEGIN INCLUDED TEXT--------------------

   SUSE Security Update: Security update for python
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:2408-1
Rating:             important
References:         #1086001 #1088004 #1088009 #985177 
Cross-References:   CVE-2016-5636 CVE-2018-1060 CVE-2018-1061
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11-SP4
                    SUSE Linux Enterprise Server 11-SP4
                    SUSE Linux Enterprise Server 11-SP3-LTSS
                    SUSE Linux Enterprise Point of Sale 11-SP3
                    SUSE Linux Enterprise Debuginfo 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________

   An update that solves three vulnerabilities and has one
   errata is now available.

Description:

   This update for python-base fixes the following issues:

   Security issues fixed:

   - CVE-2018-1061: Fixed DoS via regular expression backtracking in
     difflib.IS_LINE_JUNK method in difflib (bsc#1088004).
   - CVE-2018-1060: Fixed DoS via regular expression catastrophic
     backtracking in apop() method in pop3lib (bsc#1088009).
   - CVE-2016-5636: Fixed heap overflow in zipimporter module (bsc#985177)

   Bug fixes:

   - bsc#1086001: python tarfile uses random order.


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11-SP4:

      zypper in -t patch sdksp4-python-13737=1

   - SUSE Linux Enterprise Server 11-SP4:

      zypper in -t patch slessp4-python-13737=1

   - SUSE Linux Enterprise Server 11-SP3-LTSS:

      zypper in -t patch slessp3-python-13737=1

   - SUSE Linux Enterprise Point of Sale 11-SP3:

      zypper in -t patch sleposp3-python-13737=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-python-13737=1

   - SUSE Linux Enterprise Debuginfo 11-SP3:

      zypper in -t patch dbgsp3-python-13737=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      python-devel-2.6.9-40.15.1

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 x86_64):

      python-demo-2.6.9-40.15.1
      python-gdbm-2.6.9-40.15.1
      python-idle-2.6.9-40.15.1
      python-tk-2.6.9-40.15.1

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (noarch):

      python-doc-2.6-8.40.15.1
      python-doc-pdf-2.6-8.40.15.1

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (x86_64):

      python-32bit-2.6.9-40.15.1

   - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      libpython2_6-1_0-2.6.9-40.15.1
      python-2.6.9-40.15.1
      python-base-2.6.9-40.15.1
      python-curses-2.6.9-40.15.1
      python-demo-2.6.9-40.15.1
      python-gdbm-2.6.9-40.15.1
      python-idle-2.6.9-40.15.1
      python-tk-2.6.9-40.15.1
      python-xml-2.6.9-40.15.1

   - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):

      libpython2_6-1_0-32bit-2.6.9-40.15.1
      python-32bit-2.6.9-40.15.1
      python-base-32bit-2.6.9-40.15.1

   - SUSE Linux Enterprise Server 11-SP4 (noarch):

      python-doc-2.6-8.40.15.1
      python-doc-pdf-2.6-8.40.15.1

   - SUSE Linux Enterprise Server 11-SP4 (ia64):

      libpython2_6-1_0-x86-2.6.9-40.15.1
      python-base-x86-2.6.9-40.15.1
      python-x86-2.6.9-40.15.1

   - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):

      libpython2_6-1_0-2.6.9-40.15.1
      python-2.6.9-40.15.1
      python-base-2.6.9-40.15.1
      python-curses-2.6.9-40.15.1
      python-demo-2.6.9-40.15.1
      python-gdbm-2.6.9-40.15.1
      python-idle-2.6.9-40.15.1
      python-tk-2.6.9-40.15.1
      python-xml-2.6.9-40.15.1

   - SUSE Linux Enterprise Server 11-SP3-LTSS (s390x x86_64):

      libpython2_6-1_0-32bit-2.6.9-40.15.1
      python-32bit-2.6.9-40.15.1
      python-base-32bit-2.6.9-40.15.1

   - SUSE Linux Enterprise Server 11-SP3-LTSS (noarch):

      python-doc-2.6-8.40.15.1
      python-doc-pdf-2.6-8.40.15.1

   - SUSE Linux Enterprise Point of Sale 11-SP3 (noarch):

      python-doc-2.6-8.40.15.1
      python-doc-pdf-2.6-8.40.15.1

   - SUSE Linux Enterprise Point of Sale 11-SP3 (i586):

      libpython2_6-1_0-2.6.9-40.15.1
      python-2.6.9-40.15.1
      python-base-2.6.9-40.15.1
      python-curses-2.6.9-40.15.1
      python-demo-2.6.9-40.15.1
      python-gdbm-2.6.9-40.15.1
      python-idle-2.6.9-40.15.1
      python-tk-2.6.9-40.15.1
      python-xml-2.6.9-40.15.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      python-base-debuginfo-2.6.9-40.15.1
      python-base-debugsource-2.6.9-40.15.1
      python-debuginfo-2.6.9-40.15.1
      python-debugsource-2.6.9-40.15.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (ppc64 s390x x86_64):

      python-base-debuginfo-32bit-2.6.9-40.15.1
      python-debuginfo-32bit-2.6.9-40.15.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (ia64):

      python-base-debuginfo-x86-2.6.9-40.15.1
      python-debuginfo-x86-2.6.9-40.15.1

   - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):

      python-base-debuginfo-2.6.9-40.15.1
      python-base-debugsource-2.6.9-40.15.1
      python-debuginfo-2.6.9-40.15.1
      python-debugsource-2.6.9-40.15.1

   - SUSE Linux Enterprise Debuginfo 11-SP3 (s390x x86_64):

      python-base-debuginfo-32bit-2.6.9-40.15.1
      python-debuginfo-32bit-2.6.9-40.15.1


References:

   https://www.suse.com/security/cve/CVE-2016-5636.html
   https://www.suse.com/security/cve/CVE-2018-1060.html
   https://www.suse.com/security/cve/CVE-2018-1061.html
   https://bugzilla.suse.com/1086001
   https://bugzilla.suse.com/1088004
   https://bugzilla.suse.com/1088009
   https://bugzilla.suse.com/985177

_______________________________________________

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=9KPd
-----END PGP SIGNATURE-----