<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">python312-3.12.5-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:14295-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-08-29T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-08-29T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-08-29T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">python312-3.12.5-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the python312-3.12.5-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-14295</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0397/</URL>
      <Description>SUSE CVE CVE-2024-0397 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-4030/</URL>
      <Description>SUSE CVE CVE-2024-4030 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-4032/</URL>
      <Description>SUSE CVE CVE-2024-4032 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-6923/</URL>
      <Description>SUSE CVE CVE-2024-6923 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="python312-3.12.5-1.1">
      <FullProductName ProductID="python312-3.12.5-1.1">python312-3.12.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python312-32bit-3.12.5-1.1">
      <FullProductName ProductID="python312-32bit-3.12.5-1.1">python312-32bit-3.12.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python312-curses-3.12.5-1.1">
      <FullProductName ProductID="python312-curses-3.12.5-1.1">python312-curses-3.12.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python312-dbm-3.12.5-1.1">
      <FullProductName ProductID="python312-dbm-3.12.5-1.1">python312-dbm-3.12.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python312-idle-3.12.5-1.1">
      <FullProductName ProductID="python312-idle-3.12.5-1.1">python312-idle-3.12.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python312-tk-3.12.5-1.1">
      <FullProductName ProductID="python312-tk-3.12.5-1.1">python312-tk-3.12.5-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python312-x86-64-v3-3.12.5-1.1">
      <FullProductName ProductID="python312-x86-64-v3-3.12.5-1.1">python312-x86-64-v3-3.12.5-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="python312-3.12.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python312-3.12.5-1.1">python312-3.12.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python312-32bit-3.12.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python312-32bit-3.12.5-1.1">python312-32bit-3.12.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python312-curses-3.12.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python312-curses-3.12.5-1.1">python312-curses-3.12.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python312-dbm-3.12.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python312-dbm-3.12.5-1.1">python312-dbm-3.12.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python312-idle-3.12.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python312-idle-3.12.5-1.1">python312-idle-3.12.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python312-tk-3.12.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python312-tk-3.12.5-1.1">python312-tk-3.12.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python312-x86-64-v3-3.12.5-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python312-x86-64-v3-3.12.5-1.1">python312-x86-64-v3-3.12.5-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A defect was discovered in the Python "ssl" module where there is a memory
race condition with the ssl.SSLContext methods "cert_store_stats()" and
"get_ca_certs()". The race condition can be triggered if the methods are
called at the same time as certificates are loaded into the SSLContext,
such as during the TLS handshake with a certificate directory configured.
This issue is fixed in CPython 3.10.14, 3.11.9, 3.12.3, and 3.13.0a5.</Note>
    </Notes>
    <CVE>CVE-2024-0397</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python312-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-32bit-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-curses-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-dbm-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-idle-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-tk-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-x86-64-v3-3.12.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0397.html</URL>
        <Description>CVE-2024-0397</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226447</URL>
        <Description>SUSE Bug 1226447</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.

If you're not using Windows or haven't changed the temporary directory location then you aren't affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.

This issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix "700" for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.</Note>
    </Notes>
    <CVE>CVE-2024-4030</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python312-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-32bit-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-curses-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-dbm-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-idle-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-tk-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-x86-64-v3-3.12.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-4030.html</URL>
        <Description>CVE-2024-4030</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227152</URL>
        <Description>SUSE Bug 1227152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The "ipaddress" module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as "globally reachable" or "private". This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn't be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.

CPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.</Note>
    </Notes>
    <CVE>CVE-2024-4032</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python312-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-32bit-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-curses-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-dbm-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-idle-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-tk-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-x86-64-v3-3.12.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-4032.html</URL>
        <Description>CVE-2024-4032</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226448</URL>
        <Description>SUSE Bug 1226448</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a MEDIUM severity vulnerability affecting CPython.

The 
email module didn't properly quote newlines for email headers when 
serializing an email message allowing for header injection when an email
 is serialized.</Note>
    </Notes>
    <CVE>CVE-2024-6923</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python312-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-32bit-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-curses-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-dbm-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-idle-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-tk-3.12.5-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python312-x86-64-v3-3.12.5-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-6923.html</URL>
        <Description>CVE-2024-6923</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228780</URL>
        <Description>SUSE Bug 1228780</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
