Security update for python-setuptools
SUSE Security Update: Security update for python-setuptools
python-setuptools so far used only HTTP to retrieve
packages, which could have lead to man in the middle
attacks on newly installed python code.
This update adjusts it to use HTTPS, guaranteeing better
connection integrity.
Security Issue reference:
* CVE-2013-1633
>
Announcement ID: | SUSE-SU-2014:0523-1 |
Rating: | moderate |
References: | #843759 |
Affected Products: |
An update that fixes one vulnerability is now available.
Description:
python-setuptools so far used only HTTP to retrieve
packages, which could have lead to man in the middle
attacks on newly installed python code.
This update adjusts it to use HTTPS, guaranteeing better
connection integrity.
Security Issue reference:
* CVE-2013-1633
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP3:
zypper in -t patch sdksp3-python-setuptools-9116
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-python-setuptools-9116
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):
- python-setuptools-0.6c8-10.19.6.1
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
- python-setuptools-0.6c8-10.19.6.1
References:
- http://support.novell.com/security/cve/CVE-2013-1633.html
- https://bugzilla.novell.com/843759
- http://download.suse.com/patch/finder/?keywords=1aef002e40c14ef725314a7058cabe41