Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-9015 (GCVE-0-2016-9015)
Vulnerability from cvelistv5 – Published: 2017-01-11 16:00 – Updated: 2024-08-06 02:35
VLAI?
EPSS
Summary
Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects users using versions 1.17 and 1.18 of the urllib3 library, who are using the optional PyOpenSSL support for TLS instead of the regular standard library TLS backend, and who are using OpenSSL 1.1.0 via PyOpenSSL. This is an extremely uncommon configuration, so the security impact of this vulnerability is low.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
2 references
| URL | Tags |
|---|---|
| http://www.securityfocus.com/bid/93941 | vdb-entryx_refsource_BID |
| http://www.openwall.com/lists/oss-security/2016/10/27/6 | mailing-listx_refsource_MLIST |
Date Public ?
2016-10-27 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T02:35:02.302Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "93941",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/93941"
},
{
"name": "[oss-security] 20161027 CVE-2016-9015: Python urllib3 1.17 and 1.18 certificate verification failure",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2016/10/27/6"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-10-27T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects users using versions 1.17 and 1.18 of the urllib3 library, who are using the optional PyOpenSSL support for TLS instead of the regular standard library TLS backend, and who are using OpenSSL 1.1.0 via PyOpenSSL. This is an extremely uncommon configuration, so the security impact of this vulnerability is low."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-01-11T15:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "93941",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/93941"
},
{
"name": "[oss-security] 20161027 CVE-2016-9015: Python urllib3 1.17 and 1.18 certificate verification failure",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2016/10/27/6"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-9015",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects users using versions 1.17 and 1.18 of the urllib3 library, who are using the optional PyOpenSSL support for TLS instead of the regular standard library TLS backend, and who are using OpenSSL 1.1.0 via PyOpenSSL. This is an extremely uncommon configuration, so the security impact of this vulnerability is low."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "93941",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93941"
},
{
"name": "[oss-security] 20161027 CVE-2016-9015: Python urllib3 1.17 and 1.18 certificate verification failure",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/27/6"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2016-9015",
"datePublished": "2017-01-11T16:00:00.000Z",
"dateReserved": "2016-10-25T00:00:00.000Z",
"dateUpdated": "2024-08-06T02:35:02.302Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2016-9015",
"date": "2026-05-21",
"epss": "0.00038",
"percentile": "0.11345"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:urllib3:1.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D13162D-373A-4872-B2DC-F7088DB878ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:urllib3:1.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF034AE6-0FE0-45DF-9DC6-E536337CF9D4\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects users using versions 1.17 and 1.18 of the urllib3 library, who are using the optional PyOpenSSL support for TLS instead of the regular standard library TLS backend, and who are using OpenSSL 1.1.0 via PyOpenSSL. This is an extremely uncommon configuration, so the security impact of this vulnerability is low.\"}, {\"lang\": \"es\", \"value\": \"Versiones 1.17 y 1.18 de la librer\\u00eda de Python urllib3 sufren una vulnerabilidad que puede provocarles, en ciertas configuraciones, que no validen correctamente certificados TLS. Esto coloca a usuarios de la librer\\u00eda con aquellas configuraciones en peligro de ataques man-in-the-middle y de filtraci\\u00f3n de informaci\\u00f3n. Esta vulnerabilidad afecta a usuarios que utilizan versiones 1.17 y 1.18 de la librer\\u00eda urllib3, que est\\u00e1n utilizando el soporte PyOpenSSL opcional para TLS en lugar del backend TLS regular de una librer\\u00eda est\\u00e1ndar, y que est\\u00e1n usando OpenSSL 1.1.0 a trav\\u00e9s de PyOpenSSL. Esta es una configuraci\\u00f3n extremadamente poco com\\u00fan, por lo que el impacto de seguridad de esta vulnerabilidad es bajo.\"}]",
"id": "CVE-2016-9015",
"lastModified": "2024-11-21T03:00:26.740",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 3.7, \"baseSeverity\": \"LOW\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 1.4}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:H/Au:N/C:P/I:N/A:N\", \"baseScore\": 2.6, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"HIGH\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 4.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2017-01-11T16:59:00.347",
"references": "[{\"url\": \"http://www.openwall.com/lists/oss-security/2016/10/27/6\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Mitigation\"]}, {\"url\": \"http://www.securityfocus.com/bid/93941\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/10/27/6\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Mitigation\"]}, {\"url\": \"http://www.securityfocus.com/bid/93941\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-295\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2016-9015\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-01-11T16:59:00.347\",\"lastModified\":\"2026-05-06T22:30:45.220\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects users using versions 1.17 and 1.18 of the urllib3 library, who are using the optional PyOpenSSL support for TLS instead of the regular standard library TLS backend, and who are using OpenSSL 1.1.0 via PyOpenSSL. This is an extremely uncommon configuration, so the security impact of this vulnerability is low.\"},{\"lang\":\"es\",\"value\":\"Versiones 1.17 y 1.18 de la librer\u00eda de Python urllib3 sufren una vulnerabilidad que puede provocarles, en ciertas configuraciones, que no validen correctamente certificados TLS. Esto coloca a usuarios de la librer\u00eda con aquellas configuraciones en peligro de ataques man-in-the-middle y de filtraci\u00f3n de informaci\u00f3n. Esta vulnerabilidad afecta a usuarios que utilizan versiones 1.17 y 1.18 de la librer\u00eda urllib3, que est\u00e1n utilizando el soporte PyOpenSSL opcional para TLS en lugar del backend TLS regular de una librer\u00eda est\u00e1ndar, y que est\u00e1n usando OpenSSL 1.1.0 a trav\u00e9s de PyOpenSSL. Esta es una configuraci\u00f3n extremadamente poco com\u00fan, por lo que el impacto de seguridad de esta vulnerabilidad es bajo.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":3.7,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:N/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:urllib3:1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D13162D-373A-4872-B2DC-F7088DB878ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:urllib3:1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF034AE6-0FE0-45DF-9DC6-E536337CF9D4\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/27/6\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Mitigation\"]},{\"url\":\"http://www.securityfocus.com/bid/93941\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/27/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Mitigation\"]},{\"url\":\"http://www.securityfocus.com/bid/93941\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}"
}
}
PYSEC-2017-98
Vulnerability from pysec - Published: 2017-01-11 16:59 - Updated: 2021-08-27 03:42
VLAI?
Details
Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects users using versions 1.17 and 1.18 of the urllib3 library, who are using the optional PyOpenSSL support for TLS instead of the regular standard library TLS backend, and who are using OpenSSL 1.1.0 via PyOpenSSL. This is an extremely uncommon configuration, so the security impact of this vulnerability is low.
Impacted products
| Name | purl | urllib3 | pkg:pypi/urllib3 |
|---|
Aliases
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "urllib3",
"purl": "pkg:pypi/urllib3"
},
"ranges": [
{
"events": [
{
"introduced": "1.17"
},
{
"fixed": "1.18.1"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"1.17",
"1.18"
]
}
],
"aliases": [
"CVE-2016-9015"
],
"details": "Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects users using versions 1.17 and 1.18 of the urllib3 library, who are using the optional PyOpenSSL support for TLS instead of the regular standard library TLS backend, and who are using OpenSSL 1.1.0 via PyOpenSSL. This is an extremely uncommon configuration, so the security impact of this vulnerability is low.",
"id": "PYSEC-2017-98",
"modified": "2021-08-27T03:42:51.689777Z",
"published": "2017-01-11T16:59:00Z",
"references": [
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/93941"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2016/10/27/6"
}
]
}
SUSE-RU-2019:2627-1
Vulnerability from csaf_suse - Published: 2019-10-11 10:05 - Updated: 2019-10-11 10:05Summary
Recommended update for python-setuptools and dependend packages
Severity
Moderate
Notes
Title of the patch: Recommended update for python-setuptools and dependend packages
Description of the patch:
All changes necessary for upgrade of python-setuptools to 40.6.2 (bsc#1075812)
New packages:
- python-cachetools
- python-google-auth
- python-packaging
Rebuilt without source changes:
- python-cffi
- python-cliff
- python-mock
- python-oauthlib
- python-pbr
- python-PyJWT
- python-pytest
Added python3 packages:
- python-hgtools
- python-pyasn1-modules
- python-rsa
Updated:
- python-kubernetes
Updated to version 6.0
- python-pyparsing
Was updated to version 2.2.0.
- python-setuptools
Was upgraded to version 40.6.2.
Patchnames: HPE-Helion-OpenStack-8-2019-2627,SUSE-2019-2627,SUSE-OpenStack-Cloud-7-2019-2627,SUSE-OpenStack-Cloud-8-2019-2627,SUSE-OpenStack-Cloud-Crowbar-8-2019-2627,SUSE-SLE-DESKTOP-12-SP4-2019-2627,SUSE-SLE-Module-Containers-12-2019-2627,SUSE-SLE-Module-Public-Cloud-12-2019-2627,SUSE-SLE-SDK-12-SP4-2019-2627,SUSE-SLE-SERVER-12-SP4-2019-2627,SUSE-SUSE-Manager-Server-3.2-2019-2627,SUSE-Storage-4-2019-2627,SUSE-Storage-5-2019-2627
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Affected products
Recommended
33 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: HPE Helion OpenStack 8:python-oauthlib-0.7.2-3.9.20.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Enterprise Storage 4:python-rsa-3.1.4-12.9.17.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Enterprise Storage 5:python-rsa-3.1.4-12.9.17.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP4:python-setuptools-40.6.2-4.12.23.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Desktop 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Containers 12:python-setuptools-40.6.2-4.12.23.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Public Cloud 12:python-PyJWT-1.4.2-3.10.27.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Public Cloud 12:python-cliff-1.14.0-11.3.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Public Cloud 12:python-mock-2.0.0-3.7.25.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Public Cloud 12:python-oauthlib-0.7.2-3.9.20.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Public Cloud 12:python-pbr-3.1.1-3.5.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Public Cloud 12:python-rsa-3.1.4-12.9.17.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Public Cloud 12:python-setuptools-40.6.2-4.12.23.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Public Cloud 12:python-stevedore-1.8.0-16.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Public Cloud 12:python3-PyJWT-1.4.2-3.10.27.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Public Cloud 12:python3-mock-2.0.0-3.7.25.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Public Cloud 12:python3-oauthlib-0.7.2-3.9.20.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Public Cloud 12:python3-pbr-3.1.1-3.5.2.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Public Cloud 12:python3-setuptools-40.6.2-4.12.23.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4:python-setuptools-40.6.2-4.12.23.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:python-setuptools-40.6.2-4.12.23.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Software Development Kit 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Server 3.2:python-PyJWT-1.4.2-3.10.27.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Server 3.2:python-oauthlib-0.7.2-3.9.20.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Server 3.2:python-rsa-3.1.4-12.9.17.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 7:python-PyJWT-1.4.2-3.10.27.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 7:python-oauthlib-0.7.2-3.9.20.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 7:python-rsa-3.1.4-12.9.17.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 7:python-setuptools-40.6.2-4.12.23.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud 8:python-oauthlib-0.7.2-3.9.20.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE OpenStack Cloud Crowbar 8:python-oauthlib-0.7.2-3.9.20.noarch | — |
Vendor Fix
|
Threats
Impact
low
References
15 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Recommended update for python-setuptools and dependend packages",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nAll changes necessary for upgrade of python-setuptools to 40.6.2 (bsc#1075812)\n\nNew packages:\n- python-cachetools\n- python-google-auth\n- python-packaging\n\nRebuilt without source changes:\n\n- python-cffi\n- python-cliff\n- python-mock\n- python-oauthlib\n- python-pbr\n- python-PyJWT\n- python-pytest\n\nAdded python3 packages:\n\n- python-hgtools\n- python-pyasn1-modules\n- python-rsa\n\nUpdated:\n\n- python-kubernetes\n Updated to version 6.0\n\n- python-pyparsing\n\n Was updated to version 2.2.0.\n\n- python-setuptools\n\n Was upgraded to version 40.6.2.\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "HPE-Helion-OpenStack-8-2019-2627,SUSE-2019-2627,SUSE-OpenStack-Cloud-7-2019-2627,SUSE-OpenStack-Cloud-8-2019-2627,SUSE-OpenStack-Cloud-Crowbar-8-2019-2627,SUSE-SLE-DESKTOP-12-SP4-2019-2627,SUSE-SLE-Module-Containers-12-2019-2627,SUSE-SLE-Module-Public-Cloud-12-2019-2627,SUSE-SLE-SDK-12-SP4-2019-2627,SUSE-SLE-SERVER-12-SP4-2019-2627,SUSE-SUSE-Manager-Server-3.2-2019-2627,SUSE-Storage-4-2019-2627,SUSE-Storage-5-2019-2627",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-ru-2019_2627-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-RU-2019:2627-1",
"url": "https://www.suse.com/support/update/announcement//suse-ru-20192627-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-RU-2019:2627-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2019-October/012691.html"
},
{
"category": "self",
"summary": "SUSE Bug 1024540",
"url": "https://bugzilla.suse.com/1024540"
},
{
"category": "self",
"summary": "SUSE Bug 1054413",
"url": "https://bugzilla.suse.com/1054413"
},
{
"category": "self",
"summary": "SUSE Bug 1074247",
"url": "https://bugzilla.suse.com/1074247"
},
{
"category": "self",
"summary": "SUSE Bug 1075812",
"url": "https://bugzilla.suse.com/1075812"
},
{
"category": "self",
"summary": "SUSE Bug 1088358",
"url": "https://bugzilla.suse.com/1088358"
},
{
"category": "self",
"summary": "SUSE Bug 1091826",
"url": "https://bugzilla.suse.com/1091826"
},
{
"category": "self",
"summary": "SUSE Bug 1110422",
"url": "https://bugzilla.suse.com/1110422"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9015 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9015/"
}
],
"title": "Recommended update for python-setuptools and dependend packages",
"tracking": {
"current_release_date": "2019-10-11T10:05:54Z",
"generator": {
"date": "2019-10-11T10:05:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-RU-2019:2627-1",
"initial_release_date": "2019-10-11T10:05:54Z",
"revision_history": [
{
"date": "2019-10-11T10:05:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python-cffi-1.1.0-2.11.4.aarch64",
"product": {
"name": "python-cffi-1.1.0-2.11.4.aarch64",
"product_id": "python-cffi-1.1.0-2.11.4.aarch64"
}
},
{
"category": "product_version",
"name": "python3-cffi-1.1.0-2.11.4.aarch64",
"product": {
"name": "python3-cffi-1.1.0-2.11.4.aarch64",
"product_id": "python3-cffi-1.1.0-2.11.4.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-cffi-1.1.0-2.11.4.i586",
"product": {
"name": "python-cffi-1.1.0-2.11.4.i586",
"product_id": "python-cffi-1.1.0-2.11.4.i586"
}
},
{
"category": "product_version",
"name": "python3-cffi-1.1.0-2.11.4.i586",
"product": {
"name": "python3-cffi-1.1.0-2.11.4.i586",
"product_id": "python3-cffi-1.1.0-2.11.4.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "python-oauthlib-0.7.2-3.9.20.noarch",
"product": {
"name": "python-oauthlib-0.7.2-3.9.20.noarch",
"product_id": "python-oauthlib-0.7.2-3.9.20.noarch"
}
},
{
"category": "product_version",
"name": "python-PyJWT-1.4.2-3.10.27.noarch",
"product": {
"name": "python-PyJWT-1.4.2-3.10.27.noarch",
"product_id": "python-PyJWT-1.4.2-3.10.27.noarch"
}
},
{
"category": "product_version",
"name": "python-cachetools-1.1.6-2.3.1.noarch",
"product": {
"name": "python-cachetools-1.1.6-2.3.1.noarch",
"product_id": "python-cachetools-1.1.6-2.3.1.noarch"
}
},
{
"category": "product_version",
"name": "python-cliff-1.14.0-11.3.2.noarch",
"product": {
"name": "python-cliff-1.14.0-11.3.2.noarch",
"product_id": "python-cliff-1.14.0-11.3.2.noarch"
}
},
{
"category": "product_version",
"name": "python-cliff-doc-1.14.0-11.3.2.noarch",
"product": {
"name": "python-cliff-doc-1.14.0-11.3.2.noarch",
"product_id": "python-cliff-doc-1.14.0-11.3.2.noarch"
}
},
{
"category": "product_version",
"name": "python-google-auth-1.4.2-2.3.1.noarch",
"product": {
"name": "python-google-auth-1.4.2-2.3.1.noarch",
"product_id": "python-google-auth-1.4.2-2.3.1.noarch"
}
},
{
"category": "product_version",
"name": "python-hgtools-4.0-4.3.1.noarch",
"product": {
"name": "python-hgtools-4.0-4.3.1.noarch",
"product_id": "python-hgtools-4.0-4.3.1.noarch"
}
},
{
"category": "product_version",
"name": "python-kubernetes-6.0.0-6.1.noarch",
"product": {
"name": "python-kubernetes-6.0.0-6.1.noarch",
"product_id": "python-kubernetes-6.0.0-6.1.noarch"
}
},
{
"category": "product_version",
"name": "python-mock-2.0.0-3.7.25.noarch",
"product": {
"name": "python-mock-2.0.0-3.7.25.noarch",
"product_id": "python-mock-2.0.0-3.7.25.noarch"
}
},
{
"category": "product_version",
"name": "python-packaging-17.1-2.3.1.noarch",
"product": {
"name": "python-packaging-17.1-2.3.1.noarch",
"product_id": "python-packaging-17.1-2.3.1.noarch"
}
},
{
"category": "product_version",
"name": "python-pbr-3.1.1-3.5.2.noarch",
"product": {
"name": "python-pbr-3.1.1-3.5.2.noarch",
"product_id": "python-pbr-3.1.1-3.5.2.noarch"
}
},
{
"category": "product_version",
"name": "python-pbr-doc-3.1.1-3.5.2.noarch",
"product": {
"name": "python-pbr-doc-3.1.1-3.5.2.noarch",
"product_id": "python-pbr-doc-3.1.1-3.5.2.noarch"
}
},
{
"category": "product_version",
"name": "python-pyasn1-modules-0.0.5-7.3.1.noarch",
"product": {
"name": "python-pyasn1-modules-0.0.5-7.3.1.noarch",
"product_id": "python-pyasn1-modules-0.0.5-7.3.1.noarch"
}
},
{
"category": "product_version",
"name": "python-pyparsing-2.2.0-7.4.1.noarch",
"product": {
"name": "python-pyparsing-2.2.0-7.4.1.noarch",
"product_id": "python-pyparsing-2.2.0-7.4.1.noarch"
}
},
{
"category": "product_version",
"name": "python-pyparsing-doc-2.2.0-7.4.1.noarch",
"product": {
"name": "python-pyparsing-doc-2.2.0-7.4.1.noarch",
"product_id": "python-pyparsing-doc-2.2.0-7.4.1.noarch"
}
},
{
"category": "product_version",
"name": "python-pytest-3.3.2-2.9.3.noarch",
"product": {
"name": "python-pytest-3.3.2-2.9.3.noarch",
"product_id": "python-pytest-3.3.2-2.9.3.noarch"
}
},
{
"category": "product_version",
"name": "python-rsa-3.1.4-12.9.17.noarch",
"product": {
"name": "python-rsa-3.1.4-12.9.17.noarch",
"product_id": "python-rsa-3.1.4-12.9.17.noarch"
}
},
{
"category": "product_version",
"name": "python-setuptools-40.6.2-4.12.23.noarch",
"product": {
"name": "python-setuptools-40.6.2-4.12.23.noarch",
"product_id": "python-setuptools-40.6.2-4.12.23.noarch"
}
},
{
"category": "product_version",
"name": "python-stevedore-1.8.0-16.2.1.noarch",
"product": {
"name": "python-stevedore-1.8.0-16.2.1.noarch",
"product_id": "python-stevedore-1.8.0-16.2.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-PyJWT-1.4.2-3.10.27.noarch",
"product": {
"name": "python3-PyJWT-1.4.2-3.10.27.noarch",
"product_id": "python3-PyJWT-1.4.2-3.10.27.noarch"
}
},
{
"category": "product_version",
"name": "python3-cachetools-1.1.6-2.3.1.noarch",
"product": {
"name": "python3-cachetools-1.1.6-2.3.1.noarch",
"product_id": "python3-cachetools-1.1.6-2.3.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-google-auth-1.4.2-2.3.1.noarch",
"product": {
"name": "python3-google-auth-1.4.2-2.3.1.noarch",
"product_id": "python3-google-auth-1.4.2-2.3.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-hgtools-4.0-4.3.1.noarch",
"product": {
"name": "python3-hgtools-4.0-4.3.1.noarch",
"product_id": "python3-hgtools-4.0-4.3.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-mock-2.0.0-3.7.25.noarch",
"product": {
"name": "python3-mock-2.0.0-3.7.25.noarch",
"product_id": "python3-mock-2.0.0-3.7.25.noarch"
}
},
{
"category": "product_version",
"name": "python3-oauthlib-0.7.2-3.9.20.noarch",
"product": {
"name": "python3-oauthlib-0.7.2-3.9.20.noarch",
"product_id": "python3-oauthlib-0.7.2-3.9.20.noarch"
}
},
{
"category": "product_version",
"name": "python3-packaging-17.1-2.3.1.noarch",
"product": {
"name": "python3-packaging-17.1-2.3.1.noarch",
"product_id": "python3-packaging-17.1-2.3.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-pbr-3.1.1-3.5.2.noarch",
"product": {
"name": "python3-pbr-3.1.1-3.5.2.noarch",
"product_id": "python3-pbr-3.1.1-3.5.2.noarch"
}
},
{
"category": "product_version",
"name": "python3-pyasn1-modules-0.0.5-7.3.1.noarch",
"product": {
"name": "python3-pyasn1-modules-0.0.5-7.3.1.noarch",
"product_id": "python3-pyasn1-modules-0.0.5-7.3.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-pyparsing-2.2.0-7.4.1.noarch",
"product": {
"name": "python3-pyparsing-2.2.0-7.4.1.noarch",
"product_id": "python3-pyparsing-2.2.0-7.4.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-pyparsing-doc-2.2.0-7.4.1.noarch",
"product": {
"name": "python3-pyparsing-doc-2.2.0-7.4.1.noarch",
"product_id": "python3-pyparsing-doc-2.2.0-7.4.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-pytest-3.3.2-2.9.3.noarch",
"product": {
"name": "python3-pytest-3.3.2-2.9.3.noarch",
"product_id": "python3-pytest-3.3.2-2.9.3.noarch"
}
},
{
"category": "product_version",
"name": "python3-rsa-3.1.4-12.9.17.noarch",
"product": {
"name": "python3-rsa-3.1.4-12.9.17.noarch",
"product_id": "python3-rsa-3.1.4-12.9.17.noarch"
}
},
{
"category": "product_version",
"name": "python3-setuptools-40.6.2-4.12.23.noarch",
"product": {
"name": "python3-setuptools-40.6.2-4.12.23.noarch",
"product_id": "python3-setuptools-40.6.2-4.12.23.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "python-cffi-1.1.0-2.11.4.ppc64le",
"product": {
"name": "python-cffi-1.1.0-2.11.4.ppc64le",
"product_id": "python-cffi-1.1.0-2.11.4.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-cffi-1.1.0-2.11.4.ppc64le",
"product": {
"name": "python3-cffi-1.1.0-2.11.4.ppc64le",
"product_id": "python3-cffi-1.1.0-2.11.4.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python-cffi-1.1.0-2.11.4.s390",
"product": {
"name": "python-cffi-1.1.0-2.11.4.s390",
"product_id": "python-cffi-1.1.0-2.11.4.s390"
}
},
{
"category": "product_version",
"name": "python3-cffi-1.1.0-2.11.4.s390",
"product": {
"name": "python3-cffi-1.1.0-2.11.4.s390",
"product_id": "python3-cffi-1.1.0-2.11.4.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "python-cffi-1.1.0-2.11.4.s390x",
"product": {
"name": "python-cffi-1.1.0-2.11.4.s390x",
"product_id": "python-cffi-1.1.0-2.11.4.s390x"
}
},
{
"category": "product_version",
"name": "python3-cffi-1.1.0-2.11.4.s390x",
"product": {
"name": "python3-cffi-1.1.0-2.11.4.s390x",
"product_id": "python3-cffi-1.1.0-2.11.4.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-cffi-1.1.0-2.11.4.x86_64",
"product": {
"name": "python-cffi-1.1.0-2.11.4.x86_64",
"product_id": "python-cffi-1.1.0-2.11.4.x86_64"
}
},
{
"category": "product_version",
"name": "python3-cffi-1.1.0-2.11.4.x86_64",
"product": {
"name": "python3-cffi-1.1.0-2.11.4.x86_64",
"product_id": "python3-cffi-1.1.0-2.11.4.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Helion OpenStack 8",
"product": {
"name": "HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:hpe-helion-openstack:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 8",
"product": {
"name": "SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Containers 12",
"product": {
"name": "SUSE Linux Enterprise Module for Containers 12",
"product_id": "SUSE Linux Enterprise Module for Containers 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-containers:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 3.2",
"product": {
"name": "SUSE Manager Server 3.2",
"product_id": "SUSE Manager Server 3.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:3.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 5",
"product": {
"name": "SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-oauthlib-0.7.2-3.9.20.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:python-oauthlib-0.7.2-3.9.20.noarch"
},
"product_reference": "python-oauthlib-0.7.2-3.9.20.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-PyJWT-1.4.2-3.10.27.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:python-PyJWT-1.4.2-3.10.27.noarch"
},
"product_reference": "python-PyJWT-1.4.2-3.10.27.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-oauthlib-0.7.2-3.9.20.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:python-oauthlib-0.7.2-3.9.20.noarch"
},
"product_reference": "python-oauthlib-0.7.2-3.9.20.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rsa-3.1.4-12.9.17.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:python-rsa-3.1.4-12.9.17.noarch"
},
"product_reference": "python-rsa-3.1.4-12.9.17.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-setuptools-40.6.2-4.12.23.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:python-setuptools-40.6.2-4.12.23.noarch"
},
"product_reference": "python-setuptools-40.6.2-4.12.23.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-oauthlib-0.7.2-3.9.20.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:python-oauthlib-0.7.2-3.9.20.noarch"
},
"product_reference": "python-oauthlib-0.7.2-3.9.20.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-oauthlib-0.7.2-3.9.20.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:python-oauthlib-0.7.2-3.9.20.noarch"
},
"product_reference": "python-oauthlib-0.7.2-3.9.20.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-setuptools-40.6.2-4.12.23.noarch as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:python-setuptools-40.6.2-4.12.23.noarch"
},
"product_reference": "python-setuptools-40.6.2-4.12.23.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-setuptools-40.6.2-4.12.23.noarch as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch"
},
"product_reference": "python3-setuptools-40.6.2-4.12.23.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-setuptools-40.6.2-4.12.23.noarch as component of SUSE Linux Enterprise Module for Containers 12",
"product_id": "SUSE Linux Enterprise Module for Containers 12:python-setuptools-40.6.2-4.12.23.noarch"
},
"product_reference": "python-setuptools-40.6.2-4.12.23.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-PyJWT-1.4.2-3.10.27.noarch as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python-PyJWT-1.4.2-3.10.27.noarch"
},
"product_reference": "python-PyJWT-1.4.2-3.10.27.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cliff-1.14.0-11.3.2.noarch as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python-cliff-1.14.0-11.3.2.noarch"
},
"product_reference": "python-cliff-1.14.0-11.3.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-mock-2.0.0-3.7.25.noarch as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python-mock-2.0.0-3.7.25.noarch"
},
"product_reference": "python-mock-2.0.0-3.7.25.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-oauthlib-0.7.2-3.9.20.noarch as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python-oauthlib-0.7.2-3.9.20.noarch"
},
"product_reference": "python-oauthlib-0.7.2-3.9.20.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pbr-3.1.1-3.5.2.noarch as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python-pbr-3.1.1-3.5.2.noarch"
},
"product_reference": "python-pbr-3.1.1-3.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rsa-3.1.4-12.9.17.noarch as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python-rsa-3.1.4-12.9.17.noarch"
},
"product_reference": "python-rsa-3.1.4-12.9.17.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-setuptools-40.6.2-4.12.23.noarch as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python-setuptools-40.6.2-4.12.23.noarch"
},
"product_reference": "python-setuptools-40.6.2-4.12.23.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-stevedore-1.8.0-16.2.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python-stevedore-1.8.0-16.2.1.noarch"
},
"product_reference": "python-stevedore-1.8.0-16.2.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-PyJWT-1.4.2-3.10.27.noarch as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python3-PyJWT-1.4.2-3.10.27.noarch"
},
"product_reference": "python3-PyJWT-1.4.2-3.10.27.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-mock-2.0.0-3.7.25.noarch as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python3-mock-2.0.0-3.7.25.noarch"
},
"product_reference": "python3-mock-2.0.0-3.7.25.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-oauthlib-0.7.2-3.9.20.noarch as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python3-oauthlib-0.7.2-3.9.20.noarch"
},
"product_reference": "python3-oauthlib-0.7.2-3.9.20.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-pbr-3.1.1-3.5.2.noarch as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python3-pbr-3.1.1-3.5.2.noarch"
},
"product_reference": "python3-pbr-3.1.1-3.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-setuptools-40.6.2-4.12.23.noarch as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python3-setuptools-40.6.2-4.12.23.noarch"
},
"product_reference": "python3-setuptools-40.6.2-4.12.23.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-setuptools-40.6.2-4.12.23.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch"
},
"product_reference": "python3-setuptools-40.6.2-4.12.23.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-setuptools-40.6.2-4.12.23.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:python-setuptools-40.6.2-4.12.23.noarch"
},
"product_reference": "python-setuptools-40.6.2-4.12.23.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-setuptools-40.6.2-4.12.23.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch"
},
"product_reference": "python3-setuptools-40.6.2-4.12.23.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-setuptools-40.6.2-4.12.23.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:python-setuptools-40.6.2-4.12.23.noarch"
},
"product_reference": "python-setuptools-40.6.2-4.12.23.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-setuptools-40.6.2-4.12.23.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch"
},
"product_reference": "python3-setuptools-40.6.2-4.12.23.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-PyJWT-1.4.2-3.10.27.noarch as component of SUSE Manager Server 3.2",
"product_id": "SUSE Manager Server 3.2:python-PyJWT-1.4.2-3.10.27.noarch"
},
"product_reference": "python-PyJWT-1.4.2-3.10.27.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-oauthlib-0.7.2-3.9.20.noarch as component of SUSE Manager Server 3.2",
"product_id": "SUSE Manager Server 3.2:python-oauthlib-0.7.2-3.9.20.noarch"
},
"product_reference": "python-oauthlib-0.7.2-3.9.20.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rsa-3.1.4-12.9.17.noarch as component of SUSE Manager Server 3.2",
"product_id": "SUSE Manager Server 3.2:python-rsa-3.1.4-12.9.17.noarch"
},
"product_reference": "python-rsa-3.1.4-12.9.17.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rsa-3.1.4-12.9.17.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:python-rsa-3.1.4-12.9.17.noarch"
},
"product_reference": "python-rsa-3.1.4-12.9.17.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rsa-3.1.4-12.9.17.noarch as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:python-rsa-3.1.4-12.9.17.noarch"
},
"product_reference": "python-rsa-3.1.4-12.9.17.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-9015",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9015"
}
],
"notes": [
{
"category": "general",
"text": "Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects users using versions 1.17 and 1.18 of the urllib3 library, who are using the optional PyOpenSSL support for TLS instead of the regular standard library TLS backend, and who are using OpenSSL 1.1.0 via PyOpenSSL. This is an extremely uncommon configuration, so the security impact of this vulnerability is low.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:python-oauthlib-0.7.2-3.9.20.noarch",
"SUSE Enterprise Storage 4:python-rsa-3.1.4-12.9.17.noarch",
"SUSE Enterprise Storage 5:python-rsa-3.1.4-12.9.17.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:python-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Module for Containers 12:python-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-PyJWT-1.4.2-3.10.27.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-cliff-1.14.0-11.3.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-mock-2.0.0-3.7.25.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-oauthlib-0.7.2-3.9.20.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-pbr-3.1.1-3.5.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-rsa-3.1.4-12.9.17.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-stevedore-1.8.0-16.2.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-PyJWT-1.4.2-3.10.27.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-mock-2.0.0-3.7.25.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-oauthlib-0.7.2-3.9.20.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-pbr-3.1.1-3.5.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Server 12 SP4:python-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Server 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:python-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch",
"SUSE Manager Server 3.2:python-PyJWT-1.4.2-3.10.27.noarch",
"SUSE Manager Server 3.2:python-oauthlib-0.7.2-3.9.20.noarch",
"SUSE Manager Server 3.2:python-rsa-3.1.4-12.9.17.noarch",
"SUSE OpenStack Cloud 7:python-PyJWT-1.4.2-3.10.27.noarch",
"SUSE OpenStack Cloud 7:python-oauthlib-0.7.2-3.9.20.noarch",
"SUSE OpenStack Cloud 7:python-rsa-3.1.4-12.9.17.noarch",
"SUSE OpenStack Cloud 7:python-setuptools-40.6.2-4.12.23.noarch",
"SUSE OpenStack Cloud 8:python-oauthlib-0.7.2-3.9.20.noarch",
"SUSE OpenStack Cloud Crowbar 8:python-oauthlib-0.7.2-3.9.20.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9015",
"url": "https://www.suse.com/security/cve/CVE-2016-9015"
},
{
"category": "external",
"summary": "SUSE Bug 1023502 for CVE-2016-9015",
"url": "https://bugzilla.suse.com/1023502"
},
{
"category": "external",
"summary": "SUSE Bug 1024540 for CVE-2016-9015",
"url": "https://bugzilla.suse.com/1024540"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:python-oauthlib-0.7.2-3.9.20.noarch",
"SUSE Enterprise Storage 4:python-rsa-3.1.4-12.9.17.noarch",
"SUSE Enterprise Storage 5:python-rsa-3.1.4-12.9.17.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:python-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Module for Containers 12:python-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-PyJWT-1.4.2-3.10.27.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-cliff-1.14.0-11.3.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-mock-2.0.0-3.7.25.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-oauthlib-0.7.2-3.9.20.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-pbr-3.1.1-3.5.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-rsa-3.1.4-12.9.17.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-stevedore-1.8.0-16.2.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-PyJWT-1.4.2-3.10.27.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-mock-2.0.0-3.7.25.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-oauthlib-0.7.2-3.9.20.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-pbr-3.1.1-3.5.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Server 12 SP4:python-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Server 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:python-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch",
"SUSE Manager Server 3.2:python-PyJWT-1.4.2-3.10.27.noarch",
"SUSE Manager Server 3.2:python-oauthlib-0.7.2-3.9.20.noarch",
"SUSE Manager Server 3.2:python-rsa-3.1.4-12.9.17.noarch",
"SUSE OpenStack Cloud 7:python-PyJWT-1.4.2-3.10.27.noarch",
"SUSE OpenStack Cloud 7:python-oauthlib-0.7.2-3.9.20.noarch",
"SUSE OpenStack Cloud 7:python-rsa-3.1.4-12.9.17.noarch",
"SUSE OpenStack Cloud 7:python-setuptools-40.6.2-4.12.23.noarch",
"SUSE OpenStack Cloud 8:python-oauthlib-0.7.2-3.9.20.noarch",
"SUSE OpenStack Cloud Crowbar 8:python-oauthlib-0.7.2-3.9.20.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:python-oauthlib-0.7.2-3.9.20.noarch",
"SUSE Enterprise Storage 4:python-rsa-3.1.4-12.9.17.noarch",
"SUSE Enterprise Storage 5:python-rsa-3.1.4-12.9.17.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:python-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Module for Containers 12:python-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-PyJWT-1.4.2-3.10.27.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-cliff-1.14.0-11.3.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-mock-2.0.0-3.7.25.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-oauthlib-0.7.2-3.9.20.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-pbr-3.1.1-3.5.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-rsa-3.1.4-12.9.17.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-stevedore-1.8.0-16.2.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-PyJWT-1.4.2-3.10.27.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-mock-2.0.0-3.7.25.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-oauthlib-0.7.2-3.9.20.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-pbr-3.1.1-3.5.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Server 12 SP4:python-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Server 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:python-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:python3-setuptools-40.6.2-4.12.23.noarch",
"SUSE Manager Server 3.2:python-PyJWT-1.4.2-3.10.27.noarch",
"SUSE Manager Server 3.2:python-oauthlib-0.7.2-3.9.20.noarch",
"SUSE Manager Server 3.2:python-rsa-3.1.4-12.9.17.noarch",
"SUSE OpenStack Cloud 7:python-PyJWT-1.4.2-3.10.27.noarch",
"SUSE OpenStack Cloud 7:python-oauthlib-0.7.2-3.9.20.noarch",
"SUSE OpenStack Cloud 7:python-rsa-3.1.4-12.9.17.noarch",
"SUSE OpenStack Cloud 7:python-setuptools-40.6.2-4.12.23.noarch",
"SUSE OpenStack Cloud 8:python-oauthlib-0.7.2-3.9.20.noarch",
"SUSE OpenStack Cloud Crowbar 8:python-oauthlib-0.7.2-3.9.20.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-11T10:05:54Z",
"details": "low"
}
],
"title": "CVE-2016-9015"
}
]
}
SUSE-SU-2019:0139-1
Vulnerability from csaf_suse - Published: 2019-01-21 14:54 - Updated: 2019-01-21 14:54Summary
Security update for python-urllib3
Severity
Moderate
Notes
Title of the patch: Security update for python-urllib3
Description of the patch: This update for python-urllib3 fixes the following issues:
python-urllib3 was updated to version 1.22 (fate#326733, bsc#1110422) and contains new features and lots of bugfixes:
The full changelog can be found on:
https://github.com/Lukasa/urllib3/blob/1.22/CHANGES.rst
Security issues fixed:
- CVE-2016-9015: TLS certificate validation vulnerability (bsc#1024540).
(This issue did not affect our previous version 1.16.)
Non security issues fixed:
- bsc#1074247: Fix test suite, use correct date (gh#shazow/urllib3#1303).
Patchnames: SUSE-2019-139,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-139,SUSE-SLE-Module-Public-Cloud-12-2019-139,SUSE-SUSE-Manager-Server-3.1-2019-139,SUSE-SUSE-Manager-Server-3.2-2019-139,SUSE-Storage-4-2019-139,SUSE-Storage-5-2019-139
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Affected products
Recommended
6 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Enterprise Storage 4:python-urllib3-1.22-3.10.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Enterprise Storage 5:python-urllib3-1.22-3.10.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Public Cloud 12:python-urllib3-1.22-3.10.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Public Cloud 12:python3-urllib3-1.22-3.10.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Server 3.1:python-urllib3-1.22-3.10.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Manager Server 3.2:python-urllib3-1.22-3.10.1.noarch | — |
Vendor Fix
|
Threats
Impact
low
References
11 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python-urllib3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python-urllib3 fixes the following issues:\n\npython-urllib3 was updated to version 1.22 (fate#326733, bsc#1110422) and contains new features and lots of bugfixes:\n\nThe full changelog can be found on:\n\n https://github.com/Lukasa/urllib3/blob/1.22/CHANGES.rst\n\nSecurity issues fixed:\n\n- CVE-2016-9015: TLS certificate validation vulnerability (bsc#1024540).\n (This issue did not affect our previous version 1.16.)\n\nNon security issues fixed:\n\n- bsc#1074247: Fix test suite, use correct date (gh#shazow/urllib3#1303).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-139,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-139,SUSE-SLE-Module-Public-Cloud-12-2019-139,SUSE-SUSE-Manager-Server-3.1-2019-139,SUSE-SUSE-Manager-Server-3.2-2019-139,SUSE-Storage-4-2019-139,SUSE-Storage-5-2019-139",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0139-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:0139-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190139-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:0139-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-January/005056.html"
},
{
"category": "self",
"summary": "SUSE Bug 1024540",
"url": "https://bugzilla.suse.com/1024540"
},
{
"category": "self",
"summary": "SUSE Bug 1074247",
"url": "https://bugzilla.suse.com/1074247"
},
{
"category": "self",
"summary": "SUSE Bug 1110422",
"url": "https://bugzilla.suse.com/1110422"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9015 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9015/"
}
],
"title": "Security update for python-urllib3",
"tracking": {
"current_release_date": "2019-01-21T14:54:30Z",
"generator": {
"date": "2019-01-21T14:54:30Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:0139-1",
"initial_release_date": "2019-01-21T14:54:30Z",
"revision_history": [
{
"date": "2019-01-21T14:54:30Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python-urllib3-1.22-3.10.1.noarch",
"product": {
"name": "python-urllib3-1.22-3.10.1.noarch",
"product_id": "python-urllib3-1.22-3.10.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-urllib3-1.22-3.10.1.noarch",
"product": {
"name": "python3-urllib3-1.22-3.10.1.noarch",
"product_id": "python3-urllib3-1.22-3.10.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 3.1",
"product": {
"name": "SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:3.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 3.2",
"product": {
"name": "SUSE Manager Server 3.2",
"product_id": "SUSE Manager Server 3.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:3.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 5",
"product": {
"name": "SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-1.22-3.10.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python-urllib3-1.22-3.10.1.noarch"
},
"product_reference": "python-urllib3-1.22-3.10.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.22-3.10.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python3-urllib3-1.22-3.10.1.noarch"
},
"product_reference": "python3-urllib3-1.22-3.10.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-1.22-3.10.1.noarch as component of SUSE Manager Server 3.1",
"product_id": "SUSE Manager Server 3.1:python-urllib3-1.22-3.10.1.noarch"
},
"product_reference": "python-urllib3-1.22-3.10.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-1.22-3.10.1.noarch as component of SUSE Manager Server 3.2",
"product_id": "SUSE Manager Server 3.2:python-urllib3-1.22-3.10.1.noarch"
},
"product_reference": "python-urllib3-1.22-3.10.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-1.22-3.10.1.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:python-urllib3-1.22-3.10.1.noarch"
},
"product_reference": "python-urllib3-1.22-3.10.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-1.22-3.10.1.noarch as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:python-urllib3-1.22-3.10.1.noarch"
},
"product_reference": "python-urllib3-1.22-3.10.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-9015",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9015"
}
],
"notes": [
{
"category": "general",
"text": "Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects users using versions 1.17 and 1.18 of the urllib3 library, who are using the optional PyOpenSSL support for TLS instead of the regular standard library TLS backend, and who are using OpenSSL 1.1.0 via PyOpenSSL. This is an extremely uncommon configuration, so the security impact of this vulnerability is low.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:python-urllib3-1.22-3.10.1.noarch",
"SUSE Enterprise Storage 5:python-urllib3-1.22-3.10.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-urllib3-1.22-3.10.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-urllib3-1.22-3.10.1.noarch",
"SUSE Manager Server 3.1:python-urllib3-1.22-3.10.1.noarch",
"SUSE Manager Server 3.2:python-urllib3-1.22-3.10.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9015",
"url": "https://www.suse.com/security/cve/CVE-2016-9015"
},
{
"category": "external",
"summary": "SUSE Bug 1023502 for CVE-2016-9015",
"url": "https://bugzilla.suse.com/1023502"
},
{
"category": "external",
"summary": "SUSE Bug 1024540 for CVE-2016-9015",
"url": "https://bugzilla.suse.com/1024540"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:python-urllib3-1.22-3.10.1.noarch",
"SUSE Enterprise Storage 5:python-urllib3-1.22-3.10.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-urllib3-1.22-3.10.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-urllib3-1.22-3.10.1.noarch",
"SUSE Manager Server 3.1:python-urllib3-1.22-3.10.1.noarch",
"SUSE Manager Server 3.2:python-urllib3-1.22-3.10.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 4:python-urllib3-1.22-3.10.1.noarch",
"SUSE Enterprise Storage 5:python-urllib3-1.22-3.10.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python-urllib3-1.22-3.10.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-urllib3-1.22-3.10.1.noarch",
"SUSE Manager Server 3.1:python-urllib3-1.22-3.10.1.noarch",
"SUSE Manager Server 3.2:python-urllib3-1.22-3.10.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-21T14:54:30Z",
"details": "low"
}
],
"title": "CVE-2016-9015"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…