SUSE SLES12 Security Update : python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer (SUSE-SU-2020:0555-1)

high Nessus Plugin ID 134285



The remote SUSE host is missing one or more security updates.


This update for python-aws-sam-translator, python-boto3, python-botocore, python-cfn-lint, python-jsonschema, python-nose2, python-parameterized, python-pathlib2, python-pytest-cov, python-requests, python-s3transfer, python-jsonpatch, python-jsonpointer, python-scandir, python-PyYAML fixes the following issues :

python-cfn-lint was included as a new package in 0.21.4.

python-aws-sam-translator was updated to 1.11.0 :

- Add ReservedConcurrentExecutions to globals

- Fix ElasticsearchHttpPostPolicy resource reference

- Support using AWS::Region in Ref and Sub

- Documentation and examples updates

- Add VersionDescription property to Serverless::Function

- Update ServerlessRepoReadWriteAccessPolicy

- Add additional template validation

Upgrade to 1.10.0 :

- Add GSIs to DynamoDBReadPolicy and DynamoDBCrudPolicy

- Add DynamoDBReconfigurePolicy

- Add CostExplorerReadOnlyPolicy and OrganizationsListAccountsPolicy

- Add EKSDescribePolicy

- Add SESBulkTemplatedCrudPolicy

- Add FilterLogEventsPolicy

- Add SSMParameterReadPolicy

- Add SESEmailTemplateCrudPolicy

- Add s3:PutObjectAcl to S3CrudPolicy

- Add allow_credentials CORS option

- Add support for AccessLogSetting and CanarySetting Serverless::Api properties

- Add support for X-Ray in Serverless::Api

- Add support for MinimumCompressionSize in Serverless::Api

- Add Auth to Serverless::Api globals

- Remove trailing slashes from APIGW permissions

- Add SNS FilterPolicy and an example application

- Add Enabled property to Serverless::Function event sources

- Add support for PermissionsBoundary in Serverless::Function

- Fix boto3 client initialization

- Add PublicAccessBlockConfiguration property to S3 bucket resource

- Make PAY_PER_REQUEST default mode for Serverless::SimpleTable

- Add limited support for resolving intrinsics in Serverless::LayerVersion

- SAM now uses Flake8

- Add example application for S3 Events written in Go

- Updated several example applications

Initial build

+ Version 1.9.0

Add patch to drop compatible releases operator from, required for SLES12 as the setuptools version is too old

+ ast_drop-compatible-releases-operator.patch

python-jsonschema was updated to 2.6.0: Improved performance on CPython by adding caching around ref resolution

Update to version 2.5.0: Improved performance on CPython by adding caching around ref resolution (#203)

Update to version 2.4.0: Added a CLI (#134)

Added absolute path and absolute schema path to errors (#120)

Added ``relevance``

Meta-schemas are now loaded via ``pkgutil``

Added ``by_relevance`` and ``best_match`` (#91)

Fixed ``format`` to allow adding formats for non-strings (#125)

Fixed the ``uri`` format to reject URI references (#131)

Install /usr/bin/jsonschema with update-alternatives support

python-nose2 was updated to 0.9.1: the prof plugin now uses cProfile instead of hotshot for profiling

skipped tests now include the user's reason in junit XML's message field

the prettyassert plugin mishandled multi-line function definitions

Using a plugin's CLI flag when the plugin is already enabled via config no longer errors

nose2.plugins.prettyassert, enabled with --pretty-assert

Cleanup code for EOLed python versions

Dropped support for distutils.

Result reporter respects failure status set by other plugins

JUnit XML plugin now includes the skip reason in its output

Upgrade to 0.8.0 :

List of changes is too long to show here, see changes between 0.6.5 and 0.8.0

Update to 0.7.0: Added parameterized_class feature, for parameterizing entire test classes (many thanks to @TobyLL for their suggestions and help testing!)

Fix DeprecationWarning on `inspect.getargs` (thanks @brettdh;

Make sure that `setUp` and `tearDown` methods work correctly (#40)

Raise a ValueError when input is empty (thanks @danielbradburn;

Fix the order when number of cases exceeds 10 (thanks @ntflc;

python-scandir was included in version 2.3.2.

python-requests was updated to version 2.20.1 (bsc#1111622) Fixed bug with unintended Authorization header stripping for redirects using default ports (http/80, https/443).

remove restriction for urllib3

Update to version 2.20.0: Bugfixes

+ Content-Type header parsing is now case-insensitive (e.g. charset=utf8 v Charset=utf8).

+ Fixed exception leak where certain redirect urls would raise uncaught urllib3 exceptions.

+ Requests removes Authorization header from requests redirected from https to http on the same hostname.

+ should_bypass_proxies now handles URIs without hostnames (e.g. files).


+ Requests now supports urllib3 v1.24.


+ Requests has officially stopped support for Python 2.6.

Update to version 2.19.1: Fixed issue where’s init function failed trying to append to a __doc__ value of None.

Update to version 2.19.0: Improvements

+ Warn about possible slowdown with cryptography version


+ Parsing empty Link headers with parse_header_links() no longer return one bogus entry.

+ Fixed issue where loading the default certificate bundle from a zip archive would raise an IOError.

+ Fixed issue with unexpected ImportError on windows system which do not support winreg module.

+ DNS resolution in proxy bypass no longer includes the username and password in the request. This also fixes the issue of DNS queries failing on macOS.

+ Properly normalize adapter prefixes for url comparison.

+ Passing None as a file pointer to the files param no longer raises an exception.

+ Calling copy on a RequestsCookieJar will now preserve the cookie policy correctly.

We now support idna v2.7 and urllib3 v1.23.

update to version 2.18.4: Improvements

+ Error messages for invalid headers now include the header name for easier debugging


+ We now support idna v2.6.

update to version 2.18.3: Improvements

+ Running $ python -m now includes the installed version of idna.


+ Fixed issue where Requests would raise ConnectionError instead of SSLError when encountering SSL problems when using urllib3 v1.22.

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'.

Alternatively you can run the command listed for your product :

SUSE OpenStack Cloud Crowbar 8:zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2020-555=1

SUSE OpenStack Cloud 8:zypper in -t patch SUSE-OpenStack-Cloud-8-2020-555=1

SUSE OpenStack Cloud 7:zypper in -t patch SUSE-OpenStack-Cloud-7-2020-555=1

SUSE Manager Tools 12:zypper in -t patch SUSE-SLE-Manager-Tools-12-2020-555=1

SUSE Manager Server 3.2:zypper in -t patch SUSE-SUSE-Manager-Server-3.2-2020-555=1

SUSE Manager Proxy 3.2:zypper in -t patch SUSE-SUSE-Manager-Proxy-3.2-2020-555=1

SUSE Linux Enterprise Server for SAP 12-SP3:zypper in -t patch SUSE-SLE-SAP-12-SP3-2020-555=1

SUSE Linux Enterprise Server for SAP 12-SP2:zypper in -t patch SUSE-SLE-SAP-12-SP2-2020-555=1

SUSE Linux Enterprise Server for SAP 12-SP1:zypper in -t patch SUSE-SLE-SAP-12-SP1-2020-555=1

SUSE Linux Enterprise Server 12-SP5:zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-555=1

SUSE Linux Enterprise Server 12-SP4:zypper in -t patch SUSE-SLE-SERVER-12-SP4-2020-555=1

SUSE Linux Enterprise Server 12-SP3-LTSS:zypper in -t patch SUSE-SLE-SERVER-12-SP3-2020-555=1

SUSE Linux Enterprise Server 12-SP3-BCL:zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2020-555=1

SUSE Linux Enterprise Server 12-SP2-LTSS:zypper in -t patch SUSE-SLE-SERVER-12-SP2-2020-555=1

SUSE Linux Enterprise Server 12-SP2-BCL:zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2020-555=1

SUSE Linux Enterprise Server 12-SP1-LTSS:zypper in -t patch SUSE-SLE-SERVER-12-SP1-2020-555=1

SUSE Linux Enterprise Point of Sale 12-SP2:zypper in -t patch SUSE-SLE-POS-12-SP2-2020-555=1

SUSE Linux Enterprise Module for Public Cloud 12:zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2020-555=1

SUSE Linux Enterprise Module for Containers 12:zypper in -t patch SUSE-SLE-Module-Containers-12-2020-555=1

SUSE Linux Enterprise Module for Advanced Systems Management 12:zypper in -t patch SUSE-SLE-Module-Adv-Systems-Management-12-2020-555=1

SUSE Linux Enterprise High Availability 12-SP5:zypper in -t patch SUSE-SLE-HA-12-SP5-2020-555=1

SUSE Linux Enterprise High Availability 12-SP2:zypper in -t patch SUSE-SLE-HA-12-SP2-2020-555=1

SUSE Linux Enterprise High Availability 12-SP1:zypper in -t patch SUSE-SLE-HA-12-SP1-2020-555=1

SUSE Enterprise Storage 5:zypper in -t patch SUSE-Storage-5-2020-555=1

SUSE CaaS Platform 3.0 :

To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way.

HPE Helion Openstack 8:zypper in -t patch HPE-Helion-OpenStack-8-2020-555=1

See Also

Plugin Details

Severity: High

ID: 134285

File Name: suse_SU-2020-0555-1.nasl

Version: 1.4

Type: local

Agent: unix

Published: 3/6/2020

Updated: 4/16/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information


Risk Factor: Medium

Score: 4.4


Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2018-18074


Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:python-pyyaml, p-cpe:/a:novell:suse_linux:python-pyyaml-debuginfo, p-cpe:/a:novell:suse_linux:python-pyyaml-debugsource, p-cpe:/a:novell:suse_linux:python3-pyyaml, cpe:/o:novell:suse_linux:12

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/2/2020

Vulnerability Publication Date: 10/9/2018

Reference Information

CVE: CVE-2018-18074