<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">python38-3.8.20-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:14340-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-09-17T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-09-17T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-09-17T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">python38-3.8.20-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the python38-3.8.20-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-14340</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EB3HULWLZQ24PRVM3P2LCSJ3IJUISSTW/</URL>
      <Description>E-Mail link for openSUSE-SU-2024:14340-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-4030/</URL>
      <Description>SUSE CVE CVE-2024-4030 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-6232/</URL>
      <Description>SUSE CVE CVE-2024-6232 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="python38-3.8.20-1.1">
      <FullProductName ProductID="python38-3.8.20-1.1">python38-3.8.20-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python38-curses-3.8.20-1.1">
      <FullProductName ProductID="python38-curses-3.8.20-1.1">python38-curses-3.8.20-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python38-dbm-3.8.20-1.1">
      <FullProductName ProductID="python38-dbm-3.8.20-1.1">python38-dbm-3.8.20-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python38-idle-3.8.20-1.1">
      <FullProductName ProductID="python38-idle-3.8.20-1.1">python38-idle-3.8.20-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python38-tk-3.8.20-1.1">
      <FullProductName ProductID="python38-tk-3.8.20-1.1">python38-tk-3.8.20-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="python38-3.8.20-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python38-3.8.20-1.1">python38-3.8.20-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python38-curses-3.8.20-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python38-curses-3.8.20-1.1">python38-curses-3.8.20-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python38-dbm-3.8.20-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python38-dbm-3.8.20-1.1">python38-dbm-3.8.20-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python38-idle-3.8.20-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python38-idle-3.8.20-1.1">python38-idle-3.8.20-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python38-tk-3.8.20-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python38-tk-3.8.20-1.1">python38-tk-3.8.20-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.

If you're not using Windows or haven't changed the temporary directory location then you aren't affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.

This issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix "700" for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.</Note>
    </Notes>
    <CVE>CVE-2024-4030</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python38-3.8.20-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python38-curses-3.8.20-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python38-dbm-3.8.20-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python38-idle-3.8.20-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python38-tk-3.8.20-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EB3HULWLZQ24PRVM3P2LCSJ3IJUISSTW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-4030.html</URL>
        <Description>CVE-2024-4030</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227152</URL>
        <Description>SUSE Bug 1227152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a MEDIUM severity vulnerability affecting CPython.





Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.</Note>
    </Notes>
    <CVE>CVE-2024-6232</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python38-3.8.20-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python38-curses-3.8.20-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python38-dbm-3.8.20-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python38-idle-3.8.20-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python38-tk-3.8.20-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EB3HULWLZQ24PRVM3P2LCSJ3IJUISSTW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-6232.html</URL>
        <Description>CVE-2024-6232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230227</URL>
        <Description>SUSE Bug 1230227</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
