{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2026-32640","title":"Title"},{"category":"description","text":"SimpleEval is a library for adding evaluatable expressions into python projects. Prior to 1.0.5, objects (including modules) can leak dangerous modules through to direct access inside the sandbox. If the objects you've passed in as names to SimpleEval have modules or other disallowed / dangerous objects available as attrs. Additionally, dangerous functions or modules could be accessed by passing them as callbacks to other safe functions to call. The latest version 1.0.5 has this issue fixed. This vulnerability is fixed in 1.0.5.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2026-32640","url":"https://www.suse.com/security/cve/CVE-2026-32640"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1259685 for CVE-2026-32640","url":"https://bugzilla.suse.com/1259685"}],"title":"SUSE CVE CVE-2026-32640","tracking":{"current_release_date":"2026-03-16T17:32:09Z","generator":{"date":"2026-03-16T17:32:09Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2026-32640","initial_release_date":"2026-03-16T17:32:09Z","revision_history":[{"date":"2026-03-16T17:32:09Z","number":"2","summary":"vulnerabilities added,references added,severity changed from  to moderate"}],"status":"interim","version":"2"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"python311-simpleeval-1.0.5-1.1","product":{"name":"python311-simpleeval-1.0.5-1.1","product_id":"python311-simpleeval-1.0.5-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/python311-simpleeval@1.0.5-1.1"}}},{"category":"product_version","name":"python313-simpleeval-1.0.5-1.1","product":{"name":"python313-simpleeval-1.0.5-1.1","product_id":"python313-simpleeval-1.0.5-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/python313-simpleeval@1.0.5-1.1"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"python311-simpleeval-1.0.5-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:python311-simpleeval-1.0.5-1.1"},"product_reference":"python311-simpleeval-1.0.5-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"python313-simpleeval-1.0.5-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:python313-simpleeval-1.0.5-1.1"},"product_reference":"python313-simpleeval-1.0.5-1.1","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2026-32640","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-32640"}],"notes":[{"category":"general","text":"SimpleEval is a library for adding evaluatable expressions into python projects. Prior to 1.0.5, objects (including modules) can leak dangerous modules through to direct access inside the sandbox. If the objects you've passed in as names to SimpleEval have modules or other disallowed / dangerous objects available as attrs. Additionally, dangerous functions or modules could be accessed by passing them as callbacks to other safe functions to call. The latest version 1.0.5 has this issue fixed. This vulnerability is fixed in 1.0.5.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:python311-simpleeval-1.0.5-1.1","openSUSE Tumbleweed:python313-simpleeval-1.0.5-1.1"]},"references":[{"category":"external","summary":"CVE-2026-32640","url":"https://www.suse.com/security/cve/CVE-2026-32640"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1259685 for CVE-2026-32640","url":"https://bugzilla.suse.com/1259685"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:python311-simpleeval-1.0.5-1.1","openSUSE Tumbleweed:python313-simpleeval-1.0.5-1.1"]}],"threats":[{"category":"impact","date":"2026-03-16T09:15:07Z","details":"moderate"}],"title":"CVE-2026-32640"}]}