SynopsisThe remote SUSE host is missing one or more security updates.
DescriptionThis update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer, python-jsonpatch, python-jsonpointer, python-scandir, python-PyYAML fixes the following issues :
python-cfn-lint was included as a new package in 0.21.4.
python-aws-sam-translator was updated to 1.11.0 :
- Add ReservedConcurrentExecutions to globals
- Fix ElasticsearchHttpPostPolicy resource reference
- Support using AWS::Region in Ref and Sub
- Documentation and examples updates
- Add VersionDescription property to Serverless::Function
- Update ServerlessRepoReadWriteAccessPolicy
- Add additional template validation
Upgrade to 1.10.0 :
- Add GSIs to DynamoDBReadPolicy and DynamoDBCrudPolicy
- Add DynamoDBReconfigurePolicy
- Add CostExplorerReadOnlyPolicy and OrganizationsListAccountsPolicy
- Add EKSDescribePolicy
- Add SESBulkTemplatedCrudPolicy
- Add FilterLogEventsPolicy
- Add SSMParameterReadPolicy
- Add SESEmailTemplateCrudPolicy
- Add s3:PutObjectAcl to S3CrudPolicy
- Add allow_credentials CORS option
- Add support for AccessLogSetting and CanarySetting Serverless::Api properties
- Add support for X-Ray in Serverless::Api
- Add support for MinimumCompressionSize in Serverless::Api
- Add Auth to Serverless::Api globals
- Remove trailing slashes from APIGW permissions
- Add SNS FilterPolicy and an example application
- Add Enabled property to Serverless::Function event sources
- Add support for PermissionsBoundary in Serverless::Function
- Fix boto3 client initialization
- Add PublicAccessBlockConfiguration property to S3 bucket resource
- Make PAY_PER_REQUEST default mode for Serverless::SimpleTable
- Add limited support for resolving intrinsics in Serverless::LayerVersion
- SAM now uses Flake8
- Add example application for S3 Events written in Go
- Updated several example applications
+ Version 1.9.0
Add patch to drop compatible releases operator from setup.py, required for SLES12 as the setuptools version is too old
python-jsonschema was updated to 2.6.0: Improved performance on CPython by adding caching around ref resolution
Update to version 2.5.0: Improved performance on CPython by adding caching around ref resolution (#203)
Update to version 2.4.0: Added a CLI (#134)
Added absolute path and absolute schema path to errors (#120)
Meta-schemas are now loaded via ``pkgutil``
Added ``by_relevance`` and ``best_match`` (#91)
Fixed ``format`` to allow adding formats for non-strings (#125)
Fixed the ``uri`` format to reject URI references (#131)
Install /usr/bin/jsonschema with update-alternatives support
python-nose2 was updated to 0.9.1: the prof plugin now uses cProfile instead of hotshot for profiling
skipped tests now include the user's reason in junit XML's message field
the prettyassert plugin mishandled multi-line function definitions
Using a plugin's CLI flag when the plugin is already enabled via config no longer errors
nose2.plugins.prettyassert, enabled with --pretty-assert
Cleanup code for EOLed python versions
Dropped support for distutils.
Result reporter respects failure status set by other plugins
JUnit XML plugin now includes the skip reason in its output
Upgrade to 0.8.0 :
List of changes is too long to show here, see https://github.com/nose-devs/nose2/blob/master/docs/changelog.rst changes between 0.6.5 and 0.8.0
Update to 0.7.0: Added parameterized_class feature, for parameterizing entire test classes (many thanks to @TobyLL for their suggestions and help testing!)
Fix DeprecationWarning on `inspect.getargs` (thanks @brettdh;
Make sure that `setUp` and `tearDown` methods work correctly (#40)
Raise a ValueError when input is empty (thanks @danielbradburn;
Fix the order when number of cases exceeds 10 (thanks @ntflc;
python-scandir was included in version 2.3.2.
python-requests was updated to version 2.20.1 (bsc#1111622) Fixed bug with unintended Authorization header stripping for redirects using default ports (http/80, https/443).
remove restriction for urllib3
Update to version 2.20.0: Bugfixes
+ Content-Type header parsing is now case-insensitive (e.g. charset=utf8 v Charset=utf8).
+ Fixed exception leak where certain redirect urls would raise uncaught urllib3 exceptions.
+ Requests removes Authorization header from requests redirected from https to http on the same hostname.
+ should_bypass_proxies now handles URIs without hostnames (e.g. files).
+ Requests now supports urllib3 v1.24.
+ Requests has officially stopped support for Python 2.6.
Update to version 2.19.1: Fixed issue where status_codes.pyÃ¢Â€Â™s init function failed trying to append to a __doc__ value of None.
Update to version 2.19.0: Improvements
+ Warn about possible slowdown with cryptography version
+ Parsing empty Link headers with parse_header_links() no longer return one bogus entry.
+ Fixed issue where loading the default certificate bundle from a zip archive would raise an IOError.
+ Fixed issue with unexpected ImportError on windows system which do not support winreg module.
+ DNS resolution in proxy bypass no longer includes the username and password in the request. This also fixes the issue of DNS queries failing on macOS.
+ Properly normalize adapter prefixes for url comparison.
+ Passing None as a file pointer to the files param no longer raises an exception.
We now support idna v2.7 and urllib3 v1.23.
update to version 2.18.4: Improvements
+ Error messages for invalid headers now include the header name for easier debugging
+ We now support idna v2.6.
update to version 2.18.3: Improvements
+ Running $ python -m requests.help now includes the installed version of idna.
+ Fixed issue where Requests would raise ConnectionError instead of SSLError when encountering SSL problems when using urllib3 v1.22.
Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
SolutionTo install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'.
Alternatively you can run the command listed for your product :
SUSE OpenStack Cloud Crowbar 8:zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2020-555=1
SUSE OpenStack Cloud 8:zypper in -t patch SUSE-OpenStack-Cloud-8-2020-555=1
SUSE OpenStack Cloud 7:zypper in -t patch SUSE-OpenStack-Cloud-7-2020-555=1
SUSE Manager Tools 12:zypper in -t patch SUSE-SLE-Manager-Tools-12-2020-555=1
SUSE Manager Server 3.2:zypper in -t patch SUSE-SUSE-Manager-Server-3.2-2020-555=1
SUSE Manager Proxy 3.2:zypper in -t patch SUSE-SUSE-Manager-Proxy-3.2-2020-555=1
SUSE Linux Enterprise Server for SAP 12-SP3:zypper in -t patch SUSE-SLE-SAP-12-SP3-2020-555=1
SUSE Linux Enterprise Server for SAP 12-SP2:zypper in -t patch SUSE-SLE-SAP-12-SP2-2020-555=1
SUSE Linux Enterprise Server for SAP 12-SP1:zypper in -t patch SUSE-SLE-SAP-12-SP1-2020-555=1
SUSE Linux Enterprise Server 12-SP5:zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-555=1
SUSE Linux Enterprise Server 12-SP4:zypper in -t patch SUSE-SLE-SERVER-12-SP4-2020-555=1
SUSE Linux Enterprise Server 12-SP3-LTSS:zypper in -t patch SUSE-SLE-SERVER-12-SP3-2020-555=1
SUSE Linux Enterprise Server 12-SP3-BCL:zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2020-555=1
SUSE Linux Enterprise Server 12-SP2-LTSS:zypper in -t patch SUSE-SLE-SERVER-12-SP2-2020-555=1
SUSE Linux Enterprise Server 12-SP2-BCL:zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2020-555=1
SUSE Linux Enterprise Server 12-SP1-LTSS:zypper in -t patch SUSE-SLE-SERVER-12-SP1-2020-555=1
SUSE Linux Enterprise Point of Sale 12-SP2:zypper in -t patch SUSE-SLE-POS-12-SP2-2020-555=1
SUSE Linux Enterprise Module for Public Cloud 12:zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2020-555=1
SUSE Linux Enterprise Module for Containers 12:zypper in -t patch SUSE-SLE-Module-Containers-12-2020-555=1
SUSE Linux Enterprise Module for Advanced Systems Management 12:zypper in -t patch SUSE-SLE-Module-Adv-Systems-Management-12-2020-555=1
SUSE Linux Enterprise High Availability 12-SP5:zypper in -t patch SUSE-SLE-HA-12-SP5-2020-555=1
SUSE Linux Enterprise High Availability 12-SP2:zypper in -t patch SUSE-SLE-HA-12-SP2-2020-555=1
SUSE Linux Enterprise High Availability 12-SP1:zypper in -t patch SUSE-SLE-HA-12-SP1-2020-555=1
SUSE Enterprise Storage 5:zypper in -t patch SUSE-Storage-5-2020-555=1
SUSE CaaS Platform 3.0 :
To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way.
HPE Helion Openstack 8:zypper in -t patch HPE-Helion-OpenStack-8-2020-555=1
File Name: suse_SU-2020-0555-1.nasl
Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:novell:suse_linux:python-pyyaml, p-cpe:/a:novell:suse_linux:python-pyyaml-debuginfo, p-cpe:/a:novell:suse_linux:python-pyyaml-debugsource, p-cpe:/a:novell:suse_linux:python3-pyyaml, cpe:/o:novell:suse_linux:12
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 3/2/2020
Vulnerability Publication Date: 10/9/2018