Описание
ELSA-2018-2123: python security update (MODERATE)
[2.7.5-69.0.1]
- Add Oracle Linux distribution in platform.py [orabug 20812544]
[2.7.5-70]
- Remove 3DS cipher to mitigate CVE-2016-2183 (sweet32). Resolves: rhbz#1584545
Обновленные пакеты
Oracle Linux 7
Oracle Linux aarch64
python
2.7.5-69.0.1.el7_5
python-debug
2.7.5-69.0.1.el7_5
python-devel
2.7.5-69.0.1.el7_5
python-libs
2.7.5-69.0.1.el7_5
python-test
2.7.5-69.0.1.el7_5
python-tools
2.7.5-69.0.1.el7_5
tkinter
2.7.5-69.0.1.el7_5
Oracle Linux x86_64
python
2.7.5-69.0.1.el7_5
python-debug
2.7.5-69.0.1.el7_5
python-devel
2.7.5-69.0.1.el7_5
python-libs
2.7.5-69.0.1.el7_5
python-test
2.7.5-69.0.1.el7_5
python-tools
2.7.5-69.0.1.el7_5
tkinter
2.7.5-69.0.1.el7_5
Связанные CVE
Связанные уязвимости
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec pro ...