{"affected":[{"ecosystem_specific":{"binaries":[{"python36-setuptools":"44.1.1-8.6.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"python36-setuptools","purl":"pkg:rpm/suse/python36-setuptools&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"44.1.1-8.6.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"python36-setuptools":"44.1.1-8.6.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"python36-setuptools","purl":"pkg:rpm/suse/python36-setuptools&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"44.1.1-8.6.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for python36-setuptools fixes the following issues:\n\n- CVE-2022-40897: Fixed an excessive CPU usage that could be triggered\n  by fetching a malicious HTML document (bsc#1206667).\n","id":"SUSE-SU-2023:0094-1","modified":"2023-01-17T10:01:46Z","published":"2023-01-17T10:01:46Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20230094-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206667"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-40897"}],"related":["CVE-2022-40897"],"summary":"Security update for python36-setuptools","upstream":["CVE-2022-40897"]}