<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">python315-3.15.0~a1-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:15713-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-11-07T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-11-07T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-11-07T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">python315-3.15.0~a1-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the python315-3.15.0~a1-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-15713</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-3389/</URL>
      <Description>SUSE CVE CVE-2011-3389 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-4944/</URL>
      <Description>SUSE CVE CVE-2011-4944 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-0845/</URL>
      <Description>SUSE CVE CVE-2012-0845 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1150/</URL>
      <Description>SUSE CVE CVE-2012-1150 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1752/</URL>
      <Description>SUSE CVE CVE-2013-1752 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4238/</URL>
      <Description>SUSE CVE CVE-2013-4238 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-2667/</URL>
      <Description>SUSE CVE CVE-2014-2667 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-4650/</URL>
      <Description>SUSE CVE CVE-2014-4650 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-20907/</URL>
      <Description>SUSE CVE CVE-2019-20907 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-5010/</URL>
      <Description>SUSE CVE CVE-2019-5010 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9947/</URL>
      <Description>SUSE CVE CVE-2019-9947 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10735/</URL>
      <Description>SUSE CVE CVE-2020-10735 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15523/</URL>
      <Description>SUSE CVE CVE-2020-15523 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15801/</URL>
      <Description>SUSE CVE CVE-2020-15801 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8492/</URL>
      <Description>SUSE CVE CVE-2020-8492 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-23336/</URL>
      <Description>SUSE CVE CVE-2021-23336 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3177/</URL>
      <Description>SUSE CVE CVE-2021-3177 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3426/</URL>
      <Description>SUSE CVE CVE-2021-3426 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-25236/</URL>
      <Description>SUSE CVE CVE-2022-25236 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-42919/</URL>
      <Description>SUSE CVE CVE-2022-42919 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-45061/</URL>
      <Description>SUSE CVE CVE-2022-45061 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-0286/</URL>
      <Description>SUSE CVE CVE-2023-0286 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-24329/</URL>
      <Description>SUSE CVE CVE-2023-24329 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-2650/</URL>
      <Description>SUSE CVE CVE-2023-2650 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-27043/</URL>
      <Description>SUSE CVE CVE-2023-27043 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-40217/</URL>
      <Description>SUSE CVE CVE-2023-40217 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-52425/</URL>
      <Description>SUSE CVE CVE-2023-52425 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-4030/</URL>
      <Description>SUSE CVE CVE-2024-4030 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-4032/</URL>
      <Description>SUSE CVE CVE-2024-4032 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-6232/</URL>
      <Description>SUSE CVE CVE-2024-6232 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-6923/</URL>
      <Description>SUSE CVE CVE-2024-6923 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-7592/</URL>
      <Description>SUSE CVE CVE-2024-7592 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-8088/</URL>
      <Description>SUSE CVE CVE-2024-8088 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-0938/</URL>
      <Description>SUSE CVE CVE-2025-0938 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-4435/</URL>
      <Description>SUSE CVE CVE-2025-4435 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-4516/</URL>
      <Description>SUSE CVE CVE-2025-4516 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6069/</URL>
      <Description>SUSE CVE CVE-2025-6069 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-8194/</URL>
      <Description>SUSE CVE CVE-2025-8194 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-8291/</URL>
      <Description>SUSE CVE CVE-2025-8291 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="python315-3.15.0~a1-1.1">
      <FullProductName ProductID="python315-3.15.0~a1-1.1">python315-3.15.0~a1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python315-curses-3.15.0~a1-1.1">
      <FullProductName ProductID="python315-curses-3.15.0~a1-1.1">python315-curses-3.15.0~a1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python315-dbm-3.15.0~a1-1.1">
      <FullProductName ProductID="python315-dbm-3.15.0~a1-1.1">python315-dbm-3.15.0~a1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python315-idle-3.15.0~a1-1.1">
      <FullProductName ProductID="python315-idle-3.15.0~a1-1.1">python315-idle-3.15.0~a1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python315-profiling-3.15.0~a1-1.1">
      <FullProductName ProductID="python315-profiling-3.15.0~a1-1.1">python315-profiling-3.15.0~a1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python315-tk-3.15.0~a1-1.1">
      <FullProductName ProductID="python315-tk-3.15.0~a1-1.1">python315-tk-3.15.0~a1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python315-x86-64-v3-3.15.0~a1-1.1">
      <FullProductName ProductID="python315-x86-64-v3-3.15.0~a1-1.1">python315-x86-64-v3-3.15.0~a1-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="python315-3.15.0~a1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python315-3.15.0~a1-1.1">python315-3.15.0~a1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python315-curses-3.15.0~a1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1">python315-curses-3.15.0~a1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python315-dbm-3.15.0~a1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1">python315-dbm-3.15.0~a1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python315-idle-3.15.0~a1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1">python315-idle-3.15.0~a1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python315-profiling-3.15.0~a1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1">python315-profiling-3.15.0~a1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python315-tk-3.15.0~a1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1">python315-tk-3.15.0~a1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python315-x86-64-v3-3.15.0~a1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1">python315-x86-64-v3-3.15.0~a1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.</Note>
    </Notes>
    <CVE>CVE-2011-3389</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3389.html</URL>
        <Description>CVE-2011-3389</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/716002</URL>
        <Description>SUSE Bug 716002</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/719047</URL>
        <Description>SUSE Bug 719047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/725167</URL>
        <Description>SUSE Bug 725167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/726096</URL>
        <Description>SUSE Bug 726096</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/739248</URL>
        <Description>SUSE Bug 739248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/739256</URL>
        <Description>SUSE Bug 739256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/742306</URL>
        <Description>SUSE Bug 742306</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/751718</URL>
        <Description>SUSE Bug 751718</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/759666</URL>
        <Description>SUSE Bug 759666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/763598</URL>
        <Description>SUSE Bug 763598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/814655</URL>
        <Description>SUSE Bug 814655</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.</Note>
    </Notes>
    <CVE>CVE-2011-4944</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-4944.html</URL>
        <Description>CVE-2011-4944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/754447</URL>
        <Description>SUSE Bug 754447</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.</Note>
    </Notes>
    <CVE>CVE-2012-0845</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-0845.html</URL>
        <Description>CVE-2012-0845</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/747125</URL>
        <Description>SUSE Bug 747125</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.</Note>
    </Notes>
    <CVE>CVE-2012-1150</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1150.html</URL>
        <Description>CVE-2012-1150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/751718</URL>
        <Description>SUSE Bug 751718</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/755383</URL>
        <Description>SUSE Bug 755383</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/826682</URL>
        <Description>SUSE Bug 826682</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 "Independently Fixable" in the CVE Counting Decisions</Note>
    </Notes>
    <CVE>CVE-2013-1752</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1752.html</URL>
        <Description>CVE-2013-1752</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/856835</URL>
        <Description>SUSE Bug 856835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/856836</URL>
        <Description>SUSE Bug 856836</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/863741</URL>
        <Description>SUSE Bug 863741</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/885882</URL>
        <Description>SUSE Bug 885882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/898572</URL>
        <Description>SUSE Bug 898572</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912739</URL>
        <Description>SUSE Bug 912739</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.</Note>
    </Notes>
    <CVE>CVE-2013-4238</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4238.html</URL>
        <Description>CVE-2013-4238</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/834601</URL>
        <Description>SUSE Bug 834601</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/839107</URL>
        <Description>SUSE Bug 839107</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/882915</URL>
        <Description>SUSE Bug 882915</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912739</URL>
        <Description>SUSE Bug 912739</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.</Note>
    </Notes>
    <CVE>CVE-2014-2667</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-2667.html</URL>
        <Description>CVE-2014-2667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871152</URL>
        <Description>SUSE Bug 871152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.</Note>
    </Notes>
    <CVE>CVE-2014-4650</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-4650.html</URL>
        <Description>CVE-2014-4650</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/856835</URL>
        <Description>SUSE Bug 856835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/856836</URL>
        <Description>SUSE Bug 856836</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/863741</URL>
        <Description>SUSE Bug 863741</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/885882</URL>
        <Description>SUSE Bug 885882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/898572</URL>
        <Description>SUSE Bug 898572</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912739</URL>
        <Description>SUSE Bug 912739</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.</Note>
    </Notes>
    <CVE>CVE-2019-20907</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-20907.html</URL>
        <Description>CVE-2019-20907</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174091</URL>
        <Description>SUSE Bug 1174091</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.</Note>
    </Notes>
    <CVE>CVE-2019-5010</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-5010.html</URL>
        <Description>CVE-2019-5010</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122191</URL>
        <Description>SUSE Bug 1122191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.</Note>
    </Notes>
    <CVE>CVE-2019-9947</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9947.html</URL>
        <Description>CVE-2019-9947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130840</URL>
        <Description>SUSE Bug 1130840</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136184</URL>
        <Description>SUSE Bug 1136184</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155094</URL>
        <Description>SUSE Bug 1155094</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201559</URL>
        <Description>SUSE Bug 1201559</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2020-10735</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10735.html</URL>
        <Description>CVE-2020-10735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203125</URL>
        <Description>SUSE Bug 1203125</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1204077</URL>
        <Description>SUSE Bug 1204077</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1204096</URL>
        <Description>SUSE Bug 1204096</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1204097</URL>
        <Description>SUSE Bug 1204097</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205075</URL>
        <Description>SUSE Bug 1205075</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208131</URL>
        <Description>SUSE Bug 1208131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.</Note>
    </Notes>
    <CVE>CVE-2020-15523</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15523.html</URL>
        <Description>CVE-2020-15523</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173745</URL>
        <Description>SUSE Bug 1173745</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The &lt;executable-name&gt;._pth file (e.g., the python._pth file) is not affected.</Note>
    </Notes>
    <CVE>CVE-2020-15801</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15801.html</URL>
        <Description>CVE-2020-15801</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174241</URL>
        <Description>SUSE Bug 1174241</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.</Note>
    </Notes>
    <CVE>CVE-2020-8492</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8492.html</URL>
        <Description>CVE-2020-8492</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162367</URL>
        <Description>SUSE Bug 1162367</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.</Note>
    </Notes>
    <CVE>CVE-2021-23336</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-23336.html</URL>
        <Description>CVE-2021-23336</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182179</URL>
        <Description>SUSE Bug 1182179</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182379</URL>
        <Description>SUSE Bug 1182379</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182433</URL>
        <Description>SUSE Bug 1182433</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.</Note>
    </Notes>
    <CVE>CVE-2021-3177</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3177.html</URL>
        <Description>CVE-2021-3177</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181126</URL>
        <Description>SUSE Bug 1181126</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.</Note>
    </Notes>
    <CVE>CVE-2021-3426</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.7</BaseScore>
        <Vector>AV:A/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3426.html</URL>
        <Description>CVE-2021-3426</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183374</URL>
        <Description>SUSE Bug 1183374</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.</Note>
    </Notes>
    <CVE>CVE-2022-25236</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-25236.html</URL>
        <Description>CVE-2022-25236</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196025</URL>
        <Description>SUSE Bug 1196025</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196784</URL>
        <Description>SUSE Bug 1196784</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1197217</URL>
        <Description>SUSE Bug 1197217</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200038</URL>
        <Description>SUSE Bug 1200038</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201735</URL>
        <Description>SUSE Bug 1201735</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Python 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in many system configurations means any user on the same machine. Pickles can execute arbitrary code. Thus, this allows for local user privilege escalation to the user that any forkserver process is running as. Setting multiprocessing.util.abstract_sockets_supported to False is a workaround. The forkserver start method for multiprocessing is not the default start method. This issue is Linux specific because only Linux supports abstract namespace sockets. CPython before 3.9 does not make use of Linux abstract namespace sockets by default. Support for users manually specifying an abstract namespace socket was added as a bugfix in 3.7.8 and 3.8.3, but users would need to make specific uncommon API calls in order to do that in CPython before 3.9.</Note>
    </Notes>
    <CVE>CVE-2022-42919</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-42919.html</URL>
        <Description>CVE-2022-42919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1204886</URL>
        <Description>SUSE Bug 1204886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.</Note>
    </Notes>
    <CVE>CVE-2022-45061</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-45061.html</URL>
        <Description>CVE-2022-45061</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205244</URL>
        <Description>SUSE Bug 1205244</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211488</URL>
        <Description>SUSE Bug 1211488</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a type confusion vulnerability relating to X.400 address processing
inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but
the public structure definition for GENERAL_NAME incorrectly specified the type
of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by
the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an
ASN1_STRING.

When CRL checking is enabled (i.e. the application sets the
X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass
arbitrary pointers to a memcmp call, enabling them to read memory contents or
enact a denial of service. In most cases, the attack requires the attacker to
provide both the certificate chain and CRL, neither of which need to have a
valid signature. If the attacker only controls one of these inputs, the other
input must already contain an X.400 address as a CRL distribution point, which
is uncommon. As such, this vulnerability is most likely to only affect
applications which have implemented their own functionality for retrieving CRLs
over a network.</Note>
    </Notes>
    <CVE>CVE-2023-0286</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-0286.html</URL>
        <Description>CVE-2023-0286</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207533</URL>
        <Description>SUSE Bug 1207533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207569</URL>
        <Description>SUSE Bug 1207569</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211136</URL>
        <Description>SUSE Bug 1211136</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211503</URL>
        <Description>SUSE Bug 1211503</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213146</URL>
        <Description>SUSE Bug 1213146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214269</URL>
        <Description>SUSE Bug 1214269</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218477</URL>
        <Description>SUSE Bug 1218477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218967</URL>
        <Description>SUSE Bug 1218967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225677</URL>
        <Description>SUSE Bug 1225677</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.</Note>
    </Notes>
    <CVE>CVE-2023-24329</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-24329.html</URL>
        <Description>CVE-2023-24329</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208471</URL>
        <Description>SUSE Bug 1208471</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213553</URL>
        <Description>SUSE Bug 1213553</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213554</URL>
        <Description>SUSE Bug 1213554</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213839</URL>
        <Description>SUSE Bug 1213839</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1225672</URL>
        <Description>SUSE Bug 1225672</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Issue summary: Processing some specially crafted ASN.1 object identifiers or
data containing them may be very slow.

Impact summary: Applications that use OBJ_obj2txt() directly, or use any of
the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message
size limit may experience notable to very long delays when processing those
messages, which may lead to a Denial of Service.

An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers -
most of which have no size limit.  OBJ_obj2txt() may be used to translate
an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL
type ASN1_OBJECT) to its canonical numeric text form, which are the
sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by
periods.

When one of the sub-identifiers in the OBJECT IDENTIFIER is very large
(these are sizes that are seen as absurdly large, taking up tens or hundreds
of KiBs), the translation to a decimal number in text may take a very long
time.  The time complexity is O(n^2) with 'n' being the size of the
sub-identifiers in bytes (*).

With OpenSSL 3.0, support to fetch cryptographic algorithms using names /
identifiers in string form was introduced.  This includes using OBJECT
IDENTIFIERs in canonical numeric text form as identifiers for fetching
algorithms.

Such OBJECT IDENTIFIERs may be received through the ASN.1 structure
AlgorithmIdentifier, which is commonly used in multiple protocols to specify
what cryptographic algorithm should be used to sign or verify, encrypt or
decrypt, or digest passed data.

Applications that call OBJ_obj2txt() directly with untrusted data are
affected, with any version of OpenSSL.  If the use is for the mere purpose
of display, the severity is considered low.

In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME,
CMS, CMP/CRMF or TS.  It also impacts anything that processes X.509
certificates, including simple things like verifying its signature.

The impact on TLS is relatively low, because all versions of OpenSSL have a
100KiB limit on the peer's certificate chain.  Additionally, this only
impacts clients, or servers that have explicitly enabled client
authentication.

In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects,
such as X.509 certificates.  This is assumed to not happen in such a way
that it would cause a Denial of Service, so these versions are considered
not affected by this issue in such a way that it would be cause for concern,
and the severity is therefore considered low.</Note>
    </Notes>
    <CVE>CVE-2023-2650</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-2650.html</URL>
        <Description>CVE-2023-2650</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211430</URL>
        <Description>SUSE Bug 1211430</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.</Note>
    </Notes>
    <CVE>CVE-2023-27043</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-27043.html</URL>
        <Description>CVE-2023-27043</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1210638</URL>
        <Description>SUSE Bug 1210638</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222537</URL>
        <Description>SUSE Bug 1222537</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)</Note>
    </Notes>
    <CVE>CVE-2023-40217</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-40217.html</URL>
        <Description>CVE-2023-40217</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214692</URL>
        <Description>SUSE Bug 1214692</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1217524</URL>
        <Description>SUSE Bug 1217524</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218319</URL>
        <Description>SUSE Bug 1218319</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218476</URL>
        <Description>SUSE Bug 1218476</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218965</URL>
        <Description>SUSE Bug 1218965</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219472</URL>
        <Description>SUSE Bug 1219472</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219713</URL>
        <Description>SUSE Bug 1219713</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221582</URL>
        <Description>SUSE Bug 1221582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1224883</URL>
        <Description>SUSE Bug 1224883</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.</Note>
    </Notes>
    <CVE>CVE-2023-52425</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-52425.html</URL>
        <Description>CVE-2023-52425</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219559</URL>
        <Description>SUSE Bug 1219559</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.

If you're not using Windows or haven't changed the temporary directory location then you aren't affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.

This issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix "700" for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.</Note>
    </Notes>
    <CVE>CVE-2024-4030</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-4030.html</URL>
        <Description>CVE-2024-4030</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227152</URL>
        <Description>SUSE Bug 1227152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The "ipaddress" module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as "globally reachable" or "private". This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn't be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.

CPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.</Note>
    </Notes>
    <CVE>CVE-2024-4032</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-4032.html</URL>
        <Description>CVE-2024-4032</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226448</URL>
        <Description>SUSE Bug 1226448</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a MEDIUM severity vulnerability affecting CPython.





Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.</Note>
    </Notes>
    <CVE>CVE-2024-6232</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-6232.html</URL>
        <Description>CVE-2024-6232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230227</URL>
        <Description>SUSE Bug 1230227</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a MEDIUM severity vulnerability affecting CPython.

The 
email module didn't properly quote newlines for email headers when 
serializing an email message allowing for header injection when an email
 is serialized.</Note>
    </Notes>
    <CVE>CVE-2024-6923</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-6923.html</URL>
        <Description>CVE-2024-6923</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228780</URL>
        <Description>SUSE Bug 1228780</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a LOW severity vulnerability affecting CPython, specifically the
'http.cookies' standard library module.


When parsing cookies that contained backslashes for quoted characters in
the cookie value, the parser would use an algorithm with quadratic
complexity, resulting in excess CPU resources being used while parsing the
value.</Note>
    </Notes>
    <CVE>CVE-2024-7592</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-7592.html</URL>
        <Description>CVE-2024-7592</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229596</URL>
        <Description>SUSE Bug 1229596</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a HIGH severity vulnerability affecting the CPython "zipfile"
module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected.





When iterating over names of entries in a zip archive (for example, methods
of "zipfile.Path" like "namelist()", "iterdir()", etc)
the process can be put into an infinite loop with a maliciously crafted
zip archive. This defect applies when reading only metadata or extracting
the contents of the zip archive. Programs that are not handling
user-controlled zip archives are not affected.</Note>
    </Notes>
    <CVE>CVE-2024-8088</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-8088.html</URL>
        <Description>CVE-2024-8088</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229704</URL>
        <Description>SUSE Bug 1229704</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn't valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.</Note>
    </Notes>
    <CVE>CVE-2025-0938</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-0938.html</URL>
        <Description>CVE-2025-0938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1236705</URL>
        <Description>SUSE Bug 1236705</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When using a TarFile.errorlevel = 0  and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0  in affected versions is that the member would still be extracted and not skipped.</Note>
    </Notes>
    <CVE>CVE-2025-4435</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-4435.html</URL>
        <Description>CVE-2025-4435</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244061</URL>
        <Description>SUSE Bug 1244061</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is an issue in CPython when using `bytes.decode("unicode_escape", error="ignore|replace")`. If you are not using the "unicode_escape" encoding or an error handler your usage is not affected. To work-around this issue you may stop using the error= handler and instead wrap the bytes.decode() call in a try-except catching the DecodeError.</Note>
    </Notes>
    <CVE>CVE-2025-4516</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-4516.html</URL>
        <Description>CVE-2025-4516</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243273</URL>
        <Description>SUSE Bug 1243273</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service.</Note>
    </Notes>
    <CVE>CVE-2025-6069</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6069.html</URL>
        <Description>CVE-2025-6069</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244705</URL>
        <Description>SUSE Bug 1244705</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a defect in the CPython "tarfile" module affecting the "TarFile" extraction and entry enumeration APIs. The tar implementation would process tar archives with negative offsets without error, resulting in an infinite loop and deadlock during the parsing of maliciously crafted tar archives. 

This vulnerability can be mitigated by including the following patch after importing the "tarfile" module:   https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1</Note>
    </Notes>
    <CVE>CVE-2025-8194</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-8194.html</URL>
        <Description>CVE-2025-8194</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247249</URL>
        <Description>SUSE Bug 1247249</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The 'zipfile' module would not check the validity of the ZIP64 End of
Central Directory (EOCD) Locator record offset value would not be used to
locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be
assumed to be the previous record in the ZIP archive. This could be abused
to create ZIP archives that are handled differently by the 'zipfile' module
compared to other ZIP implementations.


Remediation maintains this behavior, but checks that the offset specified
in the ZIP64 EOCD Locator record matches the expected value.</Note>
    </Notes>
    <CVE>CVE-2025-8291</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:python315-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-8291.html</URL>
        <Description>CVE-2025-8291</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251305</URL>
        <Description>SUSE Bug 1251305</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
