Security update for python311, python-rpm-macros
| Announcement ID: | SUSE-SU-2025:20025-1 |
|---|---|
| Release Date: | 2025-02-03T08:50:41Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 10 vulnerabilities can now be installed.
Description:
This update for python311, python-rpm-macros fixes the following issues:
python311: - CVE-2024-0450: Fixed zipfile module vulnerability with "quoted-overlap" zipbomb (bsc#1221854) - CVE-2024-4032: Fixed incorrect IPv4 and IPv6 private ranges (bsc#1226448) - CVE-2024-0397: Fixed memory race condition in ssl.SSLContext certificate store methods (bsc#1226447) - CVE-2024-6923: Prevent email header injection due to unquoted newlines (bsc#1228780) - Fixed executable bits for /usr/bin/idle* (bsc#1227378).
python-rpm-macros:
-
Update to version 20240618.c146b29:
- Add %FLAVOR_pytest and %FLAVOR_pyunittest variants
-
Update to version 20240618.1e386da:
- Fix python_clone sed regex
-
Update to version 20240614.02920b8:
- Make sure that RPM_BUILD_ROOT env is set
- don't eliminate any cmdline arguments in the shebang line
- Create python313 macros
-
Update to version 20240415.c664b45:
- Fix typo 310 -> 312 in default-prjconf
-
Update to version 20240202.501440e:
- SPEC0: Drop python39, add python312 to buildset (#169)
-
Update to version 20231220.98427f3:
- fix python2_compile macro
-
Update to version 20231207.46c2ec3:
- make FLAVOR_compile compatible with python2
-
Update to version 20231204.dd64e74:
- Combine fix_shebang in one line
- New macro FLAVOR_fix_shebang_path
- Use realpath in %python_clone macro shebang replacement
- Compile and fix_shebang in %python_install macros
-
Update to version 20231010.0a1f0d9:
- Revert "Compile and fix_shebang in %python_install macros"
- gh#openSUSE/python-rpm-macros#163
-
Update to version 20231010.a32e110:
- Compile and fix_shebang in %python_install macros
-
Update to version 20231005.bf2d3ab:
- Fix shebang also in sbin with macro _fix_shebang
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Micro 6.0
zypper in -t patch SUSE-SLE-Micro-6.0-23=1 -
SUSE Linux Micro Extras 6.0
zypper in -t patch SUSE-SLE-Micro-6.0-23=1
Package List:
-
SUSE Linux Micro 6.0 (aarch64 s390x x86_64)
- python311-core-debugsource-3.11.8-3.1
- libpython3_11-1_0-debuginfo-3.11.8-3.1
- libpython3_11-1_0-3.11.8-3.1
- python311-debugsource-3.11.8-3.1
- python311-curses-debuginfo-3.11.8-3.1
- python311-base-3.11.8-3.1
- python311-debuginfo-3.11.8-3.1
- python311-curses-3.11.8-3.1
- python311-base-debuginfo-3.11.8-3.1
- python311-3.11.8-3.1
-
SUSE Linux Micro Extras 6.0 (noarch)
- python-rpm-macros-20240618.c146b29-1.1
References:
- https://www.suse.com/security/cve/CVE-2019-20907.html
- https://www.suse.com/security/cve/CVE-2019-9947.html
- https://www.suse.com/security/cve/CVE-2020-15523.html
- https://www.suse.com/security/cve/CVE-2020-15801.html
- https://www.suse.com/security/cve/CVE-2022-25236.html
- https://www.suse.com/security/cve/CVE-2023-52425.html
- https://www.suse.com/security/cve/CVE-2024-0397.html
- https://www.suse.com/security/cve/CVE-2024-0450.html
- https://www.suse.com/security/cve/CVE-2024-4032.html
- https://www.suse.com/security/cve/CVE-2024-6923.html
- https://bugzilla.suse.com/show_bug.cgi?id=1174091
- https://bugzilla.suse.com/show_bug.cgi?id=1189495
- https://bugzilla.suse.com/show_bug.cgi?id=1221854
- https://bugzilla.suse.com/show_bug.cgi?id=1226447
- https://bugzilla.suse.com/show_bug.cgi?id=1226448
- https://bugzilla.suse.com/show_bug.cgi?id=1227378
- https://bugzilla.suse.com/show_bug.cgi?id=1228780
- https://bugzilla.suse.com/show_bug.cgi?id=831629