Name "UpdateInfoReader::patchinqa" used only once: possible typo at bin/generate-cvrf.pl line 93.
Name "UpdateInfoReader::patchseverity" used only once: possible typo at bin/generate-cvrf.pl line 457.
Name "UpdateInfoReader::patchdescription" used only once: possible typo at bin/generate-cvrf.pl line 264.
Update is not defined in translation list.
Use of uninitialized value within %name2product in concatenation (.) or string at /home/securitybot/prod/cve-database/bin/UpdateInfoReader.pm line 1598.
SUSE:Channels/SUSE-ALP-Source-Standard_1.0 skipped
no pkglist for SUSE Liberty Linux 8, ESEA-2020:0159
no pkglist for SUSE Liberty Linux 8, ESBA-2020:0166
no pkglist for SUSE Liberty Linux 9, RHBA-2024:3832
no pkglist for SUSE Liberty Linux 9, RHSA-2024:3837
no pkglist for SUSE Liberty Linux 8, ESEA-2020:0158
no pkglist for SUSE Liberty Linux 8, ESEA-2021:0189
no pkglist for SUSE Liberty Linux 8, ESEA-2021:0190
no pkglist for SUSE Liberty Linux 8, ESSA-2020:0164
no pkglist for SUSE Liberty Linux 8, RHBA-2022:5328
SUSE:SLE-15:Update:PubClouds:Released SLES15-SAP-Azure-LI-BYOS images x86_64 has empty xml
SUSE:SLE-15:Update:PubClouds:Released SLES15-SAP-Azure-VLI-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-CAP-Deployment-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-CAP-Deployment-BYOS:Azure images x86_64 has empty xml
SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-CHOST-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-Manager-4-0-Azure-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-Manager-4-0-EC2-HVM-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-Manager-4-0-GCE-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-SAP-Azure-LI-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-SAP-Azure-VLI-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-SAPCAL images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2 images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-CAP-Deployment-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-CAP-Deployment-BYOS:EC2-HVM images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-CAP-Deployment-BYOS:GCE images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-CHOST-BYOS images x86_64 has empty xml
no files in SLES15-SP2-HPC
no files in SLES15-SP2-HPC-BYOS
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-HPC:EC2-HVM images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-Manager-4-1-Proxy-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-Manager-4-1-Server-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-SAP images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-SAP-Azure-LI-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-SAP-Azure-VLI-BYOS images x86_64 has empty xml
SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-SAP-BYOS images x86_64 has empty xml
no files in SLES15-SP3
no files in SLES15-SP3-BYOS
no files in SLES15-SP3-CHOST-BYOS
no files in SLES15-SP3-HPC
no files in SLES15-SP3-HPC-BYOS
no files in SLES15-SP3-HPC:EC2-HVM
no files in SLES15-SP3-Manager-4-2-Proxy-BYOS
no files in SLES15-SP3-Manager-4-2-Server-BYOS
no files in SLES15-SP3-Micro-5-1-BYOS
no files in SLES15-SP3-Micro-5-2-BYOS
no files in SLES15-SP3-Micro-BYOS
no files in SLES15-SP3-Micro-BYOS:Azure
no files in SLES15-SP3-Micro-BYOS:EC2-HVM
no files in SLES15-SP3-SAP
no files in SLES15-SP3-SAP-Azure-LI-BYOS
no files in SLES15-SP3-SAP-Azure-VLI-BYOS
no files in SLES15-SP3-SAP-BYOS
no files in SLES15-SP3-SAPCAL
no files in SLES15-SP5
no files in SLES15-SP5-BYOS
no files in SLES15-SP5-CHOST-BYOS
no files in SLES15-SP5-HPC
no files in SLES15-SP5-HPC-BYOS
no files in SLES15-SP5-Hardened-BYOS
no files in SLES15-SP5-SAP
no files in SLES15-SP5-SAP-BYOS
no files in SLES15-SP5-SAP-Hardened
no files in SLES15-SP5-SAP-Hardened-BYOS
no files in SLES15-SP5-SAPCAL
no files in SLES12-SP4-SAP-Azure-LI-BYOS
no files in SLES12-SP4-SAP-Azure-VLI-BYOS
no files in SLES12-SP5-Azure
no files in SLES12-SP5-EC2
no files in SLES12-SP5-GCE
SUSE:SLE-12-SP5:Update:PubClouds:Released SLES12-SP5-OCI-BYOS images x86_64 has empty xml
SUSE:SLE-12-SP5:Update:PubClouds:Released SLES12-SP5-SAP-Azure-LI-BYOS images x86_64 has empty xml
SUSE:SLE-12-SP5:Update:PubClouds:Released SLES12-SP5-SAP-Azure-VLI-BYOS images x86_64 has empty xml
ERROR: notice SUSE-SU-202404:15254-1 has no valid patches out of: suse-ubu204ct-client-tools-202404-15254
ERROR: notice SUSE-SU-202404:15257-1 has no valid patches out of: suse-ubu204ct-client-tools-202404-15257
ERROR: notice SUSE-SU-202404:15258-1 has no valid patches out of: suse-ubu224ct-client-tools-202404-15258
ERROR: notice SUSE-SU-2024:1322-1 has no valid patches out of: SUSE-2024-1322,SUSE-SLE-Micro-5.5-2024-1322,SUSE-SLE-Module-Live-Patching-15-SP5-2024-1322,SUSE-SLE-Module-RT-15-SP5-2024-1322,openSUSE-SLE-15.5-2024-1322
ERROR: notice SUSE-SU-2024:1322-2 has no valid patches out of: SUSE-2024-1322,SUSE-SLE-Micro-5.5-2024-1322,SUSE-SLE-Module-Live-Patching-15-SP5-2024-1322,SUSE-SLE-Module-RT-15-SP5-2024-1322,openSUSE-SLE-15.5-2024-1322
ERROR: notice SUSE-SU-2024:1332-1 has no valid patches out of: SUSE-2024-1332,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1332,openSUSE-SLE-15.5-2024-1332
ERROR: notice SUSE-SU-2024:1332-2 has no valid patches out of: SUSE-2024-1332,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1332,openSUSE-SLE-15.5-2024-1332
ERROR: notice SUSE-SU-2024:1521-1 has no valid patches out of: SUSE-2024-1521,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2024-1521
ERROR: notice SUSE-SU-2024:1522-1 has no valid patches out of: SUSE-2024-1522,SUSE-Debian-12-CLIENT-TOOLS-x86_64-2024-1522
ERROR: notice SUSE-SU-2024:1648-1 has no valid patches out of: SUSE-2024-1648,SUSE-SLE-HA-12-SP5-2024-1648,SUSE-SLE-Live-Patching-12-SP5-2024-1648,SUSE-SLE-SDK-12-SP5-2024-1648,SUSE-SLE-SERVER-12-SP5-2024-1648,SUSE-SLE-WE-12-SP5-2024-1648
ERROR: notice SUSE-SU-2024:1648-2 has no valid patches out of: SUSE-2024-1648,SUSE-SLE-HA-12-SP5-2024-1648,SUSE-SLE-Live-Patching-12-SP5-2024-1648,SUSE-SLE-SDK-12-SP5-2024-1648,SUSE-SLE-SERVER-12-SP5-2024-1648,SUSE-SLE-WE-12-SP5-2024-1648
ERROR: notice SUSE-SU-2024:2801-1 has no valid patches out of: SUSE-2024-2801,SUSE-SLE-Micro-5.3-2024-2801,SUSE-SLE-Micro-5.4-2024-2801,SUSE-SLE-Micro-5.5-2024-2801,SUSE-SLE-Module-Containers-15-SP5-2024-2801,SUSE-SLE-Module-Containers-15-SP6-2024-2801,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2801,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2801,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2801,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2801,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2801,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2801,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2801,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2801,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2801,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2801,SUSE-SUSE-MicroOS-5.1-2024-2801,SUSE-SUSE-MicroOS-5.2-2024-2801,SUSE-Storage-7.1-2024-2801,openSUSE-Leap-Micro-5.5-2024-2801,openSUSE-SLE-15.5-2024-2801,openSUSE-SLE-15.6-2024-2801
ERROR: notice SUSE-SU-2024:2801-2 has no valid patches out of: SUSE-2024-2801,SUSE-SLE-Micro-5.3-2024-2801,SUSE-SLE-Micro-5.4-2024-2801,SUSE-SLE-Micro-5.5-2024-2801,SUSE-SLE-Module-Containers-15-SP5-2024-2801,SUSE-SLE-Module-Containers-15-SP6-2024-2801,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2801,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2801,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2801,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2801,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2801,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2801,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2801,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2801,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2801,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2801,SUSE-SUSE-MicroOS-5.1-2024-2801,SUSE-SUSE-MicroOS-5.2-2024-2801,SUSE-Storage-7.1-2024-2801,openSUSE-Leap-Micro-5.5-2024-2801,openSUSE-SLE-15.5-2024-2801,openSUSE-SLE-15.6-2024-2801
--- cvrf-suse-su-2024:3760-1.xml 1970-01-01 01:00:00.000000000 +0100
+++ cvrf-suse-su-2024:3760-1.xml.new.formatted 2024-10-29 08:22:46.966490000 +0100
@@ -0,0 +1,164 @@
+
+
+ Security update for python3
+ SUSE Patch
+
+ security@suse.de
+ SUSE Security Team
+
+
+
+ SUSE-SU-2024:3760-1
+
+ Final
+ 1
+
+
+ 1
+ 2024-10-28T03:33:33Z
+ current
+
+
+ 2024-10-28T03:33:33Z
+ 2024-10-28T03:33:33Z
+
+ cve-database/bin/generate-cvrf.pl
+ 2017-02-24T01:00:00Z
+
+
+
+ Security update for python3
+ This update for python3 fixes the following issues:
+
+Security fixes:
+
+- CVE-2024-9287: properly quote path names provided when creating a virtual environment (bsc#1232241)
+
+Other fixes:
+
+- Drop .pyc files from docdir for reproducible builds (bsc#1230906)
+
+ The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
+ SUSE-2024-3760,SUSE-SUSE-MicroOS-5.1-2024-3760
+
+ Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
+
+
+ https://www.suse.com/support/update/announcement/2024/suse-su-20243760-1/
+ Link for SUSE-SU-2024:3760-1
+
+
+ https://lists.suse.com/pipermail/sle-security-updates/2024-October/019680.html
+ E-Mail link for SUSE-SU-2024:3760-1
+
+
+ https://www.suse.com/support/security/rating/
+ SUSE Security Ratings
+
+
+ https://bugzilla.suse.com/1230906
+ SUSE Bug 1230906
+
+
+ https://bugzilla.suse.com/1232241
+ SUSE Bug 1232241
+
+
+ https://www.suse.com/security/cve/CVE-2024-9287/
+ SUSE CVE CVE-2024-9287 page
+
+
+
+
+
+ SUSE Linux Enterprise Micro 5.1
+
+
+
+ libpython3_6m1_0-3.6.15-150000.3.164.1
+
+
+ libpython3_6m1_0-32bit-3.6.15-150000.3.164.1
+
+
+ libpython3_6m1_0-64bit-3.6.15-150000.3.164.1
+
+
+ python3-3.6.15-150000.3.164.1
+
+
+ python3-base-3.6.15-150000.3.164.1
+
+
+ python3-curses-3.6.15-150000.3.164.1
+
+
+ python3-dbm-3.6.15-150000.3.164.1
+
+
+ python3-devel-3.6.15-150000.3.164.1
+
+
+ python3-doc-3.6.15-150000.3.164.1
+
+
+ python3-doc-devhelp-3.6.15-150000.3.164.1
+
+
+ python3-idle-3.6.15-150000.3.164.1
+
+
+ python3-testsuite-3.6.15-150000.3.164.1
+
+
+ python3-tk-3.6.15-150000.3.164.1
+
+
+ python3-tools-3.6.15-150000.3.164.1
+
+
+ libpython3_6m1_0-3.6.15-150000.3.164.1 as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ python3-3.6.15-150000.3.164.1 as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ python3-base-3.6.15-150000.3.164.1 as a component of SUSE Linux Enterprise Micro 5.1
+
+
+
+
+ A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.
+
+ CVE-2024-9287
+
+
+ SUSE Linux Enterprise Micro 5.1:libpython3_6m1_0-3.6.15-150000.3.164.1
+ SUSE Linux Enterprise Micro 5.1:python3-3.6.15-150000.3.164.1
+ SUSE Linux Enterprise Micro 5.1:python3-base-3.6.15-150000.3.164.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+ https://www.suse.com/support/update/announcement/2024/suse-su-20243760-1/
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-9287.html
+ CVE-2024-9287
+
+
+ https://bugzilla.suse.com/1232241
+ SUSE Bug 1232241
+
+
+
+
--- cvrf-suse-su-2024:3760-1.xml 1970-01-01 01:00:00.000000000 +0100
+++ cvrf-suse-su-2024:3760-1.xml.new.formatted 2024-10-29 08:22:47.529432000 +0100
@@ -0,0 +1,170 @@
+
+
+ Security update for python3
+ SUSE Patch
+
+ security@suse.de
+ SUSE Security Team
+
+
+
+ SUSE-SU-2024:3760-1
+
+ Final
+ 1
+
+
+ 1
+ 2024-10-28T03:33:33Z
+ current
+
+
+ 2024-10-28T03:33:33Z
+ 2024-10-28T03:33:33Z
+
+ cve-database/bin/generate-cvrf.pl
+ 2017-02-24T01:00:00Z
+
+
+
+ Security update for python3
+ This update for python3 fixes the following issues:
+
+Security fixes:
+
+- CVE-2024-9287: properly quote path names provided when creating a virtual environment (bsc#1232241)
+
+Other fixes:
+
+- Drop .pyc files from docdir for reproducible builds (bsc#1230906)
+
+ The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
+ SUSE-2024-3760,SUSE-SUSE-MicroOS-5.1-2024-3760
+
+ Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
+
+
+ https://www.suse.com/support/update/announcement/2024/suse-su-20243760-1/
+ Link for SUSE-SU-2024:3760-1
+
+
+ https://lists.suse.com/pipermail/sle-security-updates/2024-October/019680.html
+ E-Mail link for SUSE-SU-2024:3760-1
+
+
+ https://www.suse.com/support/security/rating/
+ SUSE Security Ratings
+
+
+ https://bugzilla.suse.com/1230906
+ SUSE Bug 1230906
+
+
+ https://bugzilla.suse.com/1232241
+ SUSE Bug 1232241
+
+
+ https://www.suse.com/security/cve/CVE-2024-9287/
+ SUSE CVE CVE-2024-9287 page
+
+
+
+
+
+ SUSE Linux Enterprise Micro 5.1
+
+
+
+ libpython3_6m1_0-3.6.15-150000.3.164.1
+
+
+ libpython3_6m1_0-32bit-3.6.15-150000.3.164.1
+
+
+ libpython3_6m1_0-64bit-3.6.15-150000.3.164.1
+
+
+ python3-3.6.15-150000.3.164.1
+
+
+ python3-base-3.6.15-150000.3.164.1
+
+
+ python3-curses-3.6.15-150000.3.164.1
+
+
+ python3-dbm-3.6.15-150000.3.164.1
+
+
+ python3-devel-3.6.15-150000.3.164.1
+
+
+ python3-doc-3.6.15-150000.3.164.1
+
+
+ python3-doc-devhelp-3.6.15-150000.3.164.1
+
+
+ python3-idle-3.6.15-150000.3.164.1
+
+
+ python3-testsuite-3.6.15-150000.3.164.1
+
+
+ python3-tk-3.6.15-150000.3.164.1
+
+
+ python3-tools-3.6.15-150000.3.164.1
+
+
+ libpython3_6m1_0-3.6.15-150000.3.164.1 as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ python3-3.6.15-150000.3.164.1 as a component of SUSE Linux Enterprise Micro 5.1
+
+
+ python3-base-3.6.15-150000.3.164.1 as a component of SUSE Linux Enterprise Micro 5.1
+
+
+
+
+ A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.
+
+ CVE-2024-9287
+
+
+ SUSE Linux Enterprise Micro 5.1:libpython3_6m1_0-3.6.15-150000.3.164.1
+ SUSE Linux Enterprise Micro 5.1:python3-3.6.15-150000.3.164.1
+ SUSE Linux Enterprise Micro 5.1:python3-base-3.6.15-150000.3.164.1
+
+
+
+
+ moderate
+
+
+
+
+ 6.5
+ CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+ https://www.suse.com/support/update/announcement/2024/suse-su-20243760-1/
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-9287.html
+ CVE-2024-9287
+
+
+ https://bugzilla.suse.com/1232241
+ SUSE Bug 1232241
+
+
+
+
ERROR: notice openSUSE-SU-2024:0123-1 has no valid patches out of: openSUSE-2024-123
no cpe found for SUSE Package Hub 15 SP5
no cpe found for SUSE Package Hub 15 SP6
--- cvrf-opensuse-su-2024:0341-1.xml 1970-01-01 01:00:00.000000000 +0100
+++ cvrf-opensuse-su-2024:0341-1.xml.new.formatted 2024-10-29 08:22:48.066377000 +0100
@@ -0,0 +1,241 @@
+
+
+ Security update for chromium
+ SUSE Patch
+
+ security@suse.de
+ SUSE Security Team
+
+
+
+ openSUSE-SU-2024:0341-1
+
+ Final
+ 1
+
+
+ 1
+ 2024-10-28T15:20:35Z
+ current
+
+
+ 2024-10-28T15:20:35Z
+ 2024-10-28T15:20:35Z
+
+ cve-database/bin/generate-cvrf.pl
+ 2017-02-24T01:00:00Z
+
+
+
+ Security update for chromium
+ This update for chromium fixes the following issues:
+
+Chromium 130.0.6723.69 (boo#1232060)
+
+ * CVE-2024-10229: Inappropriate implementation in Extensions
+ * CVE-2024-10230: Type Confusion in V8
+ * CVE-2024-10231: Type Confusion in V8
+
+ The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
+ openSUSE-2024-341
+
+ Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
+
+
+ https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PEJPFZ7F3SICZGHQRWBWYOGKITIYN67/
+ E-Mail link for openSUSE-SU-2024:0341-1
+
+
+ https://www.suse.com/support/security/rating/
+ SUSE Security Ratings
+
+
+ https://bugzilla.suse.com/1232060
+ SUSE Bug 1232060
+
+
+ https://www.suse.com/security/cve/CVE-2024-10229/
+ SUSE CVE CVE-2024-10229 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-10230/
+ SUSE CVE CVE-2024-10230 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-10231/
+ SUSE CVE CVE-2024-10231 page
+
+
+
+
+
+ SUSE Package Hub 15 SP5
+
+
+
+
+ SUSE Package Hub 15 SP6
+
+
+
+
+ openSUSE Leap 15.5
+
+
+
+
+ openSUSE Leap 15.6
+
+
+
+ chromedriver-130.0.6723.69-bp156.2.44.1
+
+
+ chromium-130.0.6723.69-bp156.2.44.1
+
+
+ chromedriver-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP5
+
+
+ chromium-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP5
+
+
+ chromedriver-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP6
+
+
+ chromium-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP6
+
+
+ chromedriver-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.5
+
+
+ chromium-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.5
+
+
+ chromedriver-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.6
+
+
+ chromium-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.6
+
+
+
+
+ Inappropriate implementation in Extensions in Google Chrome prior to 130.0.6723.69 allowed a remote attacker to bypass site isolation via a crafted Chrome Extension. (Chromium security severity: High)
+
+ CVE-2024-10229
+
+
+ SUSE Package Hub 15 SP5:chromedriver-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP5:chromium-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP6:chromedriver-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP6:chromium-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.5:chromedriver-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.5:chromium-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.6:chromedriver-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.6:chromium-130.0.6723.69-bp156.2.44.1
+
+
+
+
+ important
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+ https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PEJPFZ7F3SICZGHQRWBWYOGKITIYN67/
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-10229.html
+ CVE-2024-10229
+
+
+ https://bugzilla.suse.com/1232060
+ SUSE Bug 1232060
+
+
+
+
+
+ Type Confusion in V8 in Google Chrome prior to 130.0.6723.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
+
+ CVE-2024-10230
+
+
+ SUSE Package Hub 15 SP5:chromedriver-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP5:chromium-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP6:chromedriver-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP6:chromium-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.5:chromedriver-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.5:chromium-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.6:chromedriver-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.6:chromium-130.0.6723.69-bp156.2.44.1
+
+
+
+
+ important
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+ https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PEJPFZ7F3SICZGHQRWBWYOGKITIYN67/
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-10230.html
+ CVE-2024-10230
+
+
+ https://bugzilla.suse.com/1232060
+ SUSE Bug 1232060
+
+
+
+
+
+ Type Confusion in V8 in Google Chrome prior to 130.0.6723.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
+
+ CVE-2024-10231
+
+
+ SUSE Package Hub 15 SP5:chromedriver-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP5:chromium-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP6:chromedriver-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP6:chromium-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.5:chromedriver-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.5:chromium-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.6:chromedriver-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.6:chromium-130.0.6723.69-bp156.2.44.1
+
+
+
+
+ important
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+ https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PEJPFZ7F3SICZGHQRWBWYOGKITIYN67/
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-10231.html
+ CVE-2024-10231
+
+
+ https://bugzilla.suse.com/1232060
+ SUSE Bug 1232060
+
+
+
+
no cpe found for SUSE Package Hub 15 SP5
no cpe found for SUSE Package Hub 15 SP6
--- cvrf-opensuse-su-2024:0341-1.xml 1970-01-01 01:00:00.000000000 +0100
+++ cvrf-opensuse-su-2024:0341-1.xml.new.formatted 2024-10-29 08:22:48.454357000 +0100
@@ -0,0 +1,259 @@
+
+
+ Security update for chromium
+ SUSE Patch
+
+ security@suse.de
+ SUSE Security Team
+
+
+
+ openSUSE-SU-2024:0341-1
+
+ Final
+ 1
+
+
+ 1
+ 2024-10-28T15:20:35Z
+ current
+
+
+ 2024-10-28T15:20:35Z
+ 2024-10-28T15:20:35Z
+
+ cve-database/bin/generate-cvrf.pl
+ 2017-02-24T01:00:00Z
+
+
+
+ Security update for chromium
+ This update for chromium fixes the following issues:
+
+Chromium 130.0.6723.69 (boo#1232060)
+
+ * CVE-2024-10229: Inappropriate implementation in Extensions
+ * CVE-2024-10230: Type Confusion in V8
+ * CVE-2024-10231: Type Confusion in V8
+
+ The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
+ openSUSE-2024-341
+
+ Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
+
+
+ https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PEJPFZ7F3SICZGHQRWBWYOGKITIYN67/
+ E-Mail link for openSUSE-SU-2024:0341-1
+
+
+ https://www.suse.com/support/security/rating/
+ SUSE Security Ratings
+
+
+ https://bugzilla.suse.com/1232060
+ SUSE Bug 1232060
+
+
+ https://www.suse.com/security/cve/CVE-2024-10229/
+ SUSE CVE CVE-2024-10229 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-10230/
+ SUSE CVE CVE-2024-10230 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-10231/
+ SUSE CVE CVE-2024-10231 page
+
+
+
+
+
+ SUSE Package Hub 15 SP5
+
+
+
+
+ SUSE Package Hub 15 SP6
+
+
+
+
+ openSUSE Leap 15.5
+
+
+
+
+ openSUSE Leap 15.6
+
+
+
+ chromedriver-130.0.6723.69-bp156.2.44.1
+
+
+ chromium-130.0.6723.69-bp156.2.44.1
+
+
+ chromedriver-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP5
+
+
+ chromium-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP5
+
+
+ chromedriver-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP6
+
+
+ chromium-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP6
+
+
+ chromedriver-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.5
+
+
+ chromium-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.5
+
+
+ chromedriver-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.6
+
+
+ chromium-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.6
+
+
+
+
+ Inappropriate implementation in Extensions in Google Chrome prior to 130.0.6723.69 allowed a remote attacker to bypass site isolation via a crafted Chrome Extension. (Chromium security severity: High)
+
+ CVE-2024-10229
+
+
+ SUSE Package Hub 15 SP5:chromedriver-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP5:chromium-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP6:chromedriver-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP6:chromium-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.5:chromedriver-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.5:chromium-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.6:chromedriver-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.6:chromium-130.0.6723.69-bp156.2.44.1
+
+
+
+
+ important
+
+
+
+
+ 8.1
+ CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+ https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PEJPFZ7F3SICZGHQRWBWYOGKITIYN67/
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-10229.html
+ CVE-2024-10229
+
+
+ https://bugzilla.suse.com/1232060
+ SUSE Bug 1232060
+
+
+
+
+
+ Type Confusion in V8 in Google Chrome prior to 130.0.6723.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
+
+ CVE-2024-10230
+
+
+ SUSE Package Hub 15 SP5:chromedriver-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP5:chromium-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP6:chromedriver-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP6:chromium-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.5:chromedriver-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.5:chromium-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.6:chromedriver-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.6:chromium-130.0.6723.69-bp156.2.44.1
+
+
+
+
+ important
+
+
+
+
+ 8.8
+ CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+ https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PEJPFZ7F3SICZGHQRWBWYOGKITIYN67/
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-10230.html
+ CVE-2024-10230
+
+
+ https://bugzilla.suse.com/1232060
+ SUSE Bug 1232060
+
+
+
+
+
+ Type Confusion in V8 in Google Chrome prior to 130.0.6723.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
+
+ CVE-2024-10231
+
+
+ SUSE Package Hub 15 SP5:chromedriver-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP5:chromium-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP6:chromedriver-130.0.6723.69-bp156.2.44.1
+ SUSE Package Hub 15 SP6:chromium-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.5:chromedriver-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.5:chromium-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.6:chromedriver-130.0.6723.69-bp156.2.44.1
+ openSUSE Leap 15.6:chromium-130.0.6723.69-bp156.2.44.1
+
+
+
+
+ important
+
+
+
+
+ 8.8
+ CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+ https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PEJPFZ7F3SICZGHQRWBWYOGKITIYN67/
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-10231.html
+ CVE-2024-10231
+
+
+ https://bugzilla.suse.com/1232060
+ SUSE Bug 1232060
+
+
+
+
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
--- cvrf-opensuse-su-2024:14431-1.xml 1970-01-01 01:00:00.000000000 +0100
+++ cvrf-opensuse-su-2024:14431-1.xml.new.formatted 2024-10-29 08:22:54.070087000 +0100
@@ -0,0 +1,129 @@
+
+
+ grafana-11.3.0-1.1 on GA media
+ SUSE Patch
+
+ security@suse.de
+ SUSE Security Team
+
+
+
+ openSUSE-SU-2024:14431-1
+
+ Final
+ 1
+
+
+ 1
+ 2024-10-28T00:00:00Z
+ current
+
+
+ 2024-10-28T00:00:00Z
+ 2024-10-28T00:00:00Z
+
+ cve-database/bin/generate-cvrf.pl
+ 2017-02-24T01:00:00Z
+
+
+
+ grafana-11.3.0-1.1 on GA media
+ These are all security issues fixed in the grafana-11.3.0-1.1 package on the GA media of openSUSE Tumbleweed.
+ The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
+ openSUSE-Tumbleweed-2024-14431
+
+ Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
+
+
+ https://www.suse.com/support/security/rating/
+ SUSE Security Ratings
+
+
+ https://www.suse.com/security/cve/CVE-2024-8118/
+ SUSE CVE CVE-2024-8118 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-9264/
+ SUSE CVE CVE-2024-9264 page
+
+
+
+
+
+ openSUSE Tumbleweed
+
+
+
+ grafana-11.3.0-1.1
+
+
+ grafana-11.3.0-1.1 as a component of openSUSE Tumbleweed
+
+
+
+
+ In Grafana, the wrong permission is applied to the alert rule write API endpoint, allowing users with permission to write external alert instances to also write alert rules.
+
+ CVE-2024-8118
+
+
+ openSUSE Tumbleweed:grafana-11.3.0-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-8118.html
+ CVE-2024-8118
+
+
+ https://bugzilla.suse.com/1231024
+ SUSE Bug 1231024
+
+
+
+
+
+ The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
+
+ CVE-2024-9264
+
+
+ openSUSE Tumbleweed:grafana-11.3.0-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-9264.html
+ CVE-2024-9264
+
+
+ https://bugzilla.suse.com/1231844
+ SUSE Bug 1231844
+
+
+
+
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
--- cvrf-opensuse-su-2024:14431-1.xml 1970-01-01 01:00:00.000000000 +0100
+++ cvrf-opensuse-su-2024:14431-1.xml.new.formatted 2024-10-29 08:22:54.363045000 +0100
@@ -0,0 +1,141 @@
+
+
+ grafana-11.3.0-1.1 on GA media
+ SUSE Patch
+
+ security@suse.de
+ SUSE Security Team
+
+
+
+ openSUSE-SU-2024:14431-1
+
+ Final
+ 1
+
+
+ 1
+ 2024-10-28T00:00:00Z
+ current
+
+
+ 2024-10-28T00:00:00Z
+ 2024-10-28T00:00:00Z
+
+ cve-database/bin/generate-cvrf.pl
+ 2017-02-24T01:00:00Z
+
+
+
+ grafana-11.3.0-1.1 on GA media
+ These are all security issues fixed in the grafana-11.3.0-1.1 package on the GA media of openSUSE Tumbleweed.
+ The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
+ openSUSE-Tumbleweed-2024-14431
+
+ Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
+
+
+ https://www.suse.com/support/security/rating/
+ SUSE Security Ratings
+
+
+ https://www.suse.com/security/cve/CVE-2024-8118/
+ SUSE CVE CVE-2024-8118 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-9264/
+ SUSE CVE CVE-2024-9264 page
+
+
+
+
+
+ openSUSE Tumbleweed
+
+
+
+ grafana-11.3.0-1.1
+
+
+ grafana-11.3.0-1.1 as a component of openSUSE Tumbleweed
+
+
+
+
+ In Grafana, the wrong permission is applied to the alert rule write API endpoint, allowing users with permission to write external alert instances to also write alert rules.
+
+ CVE-2024-8118
+
+
+ openSUSE Tumbleweed:grafana-11.3.0-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 4.7
+ CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-8118.html
+ CVE-2024-8118
+
+
+ https://bugzilla.suse.com/1231024
+ SUSE Bug 1231024
+
+
+
+
+
+ The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
+
+ CVE-2024-9264
+
+
+ openSUSE Tumbleweed:grafana-11.3.0-1.1
+
+
+
+
+ critical
+
+
+
+
+ 9.9
+ CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-9264.html
+ CVE-2024-9264
+
+
+ https://bugzilla.suse.com/1231844
+ SUSE Bug 1231844
+
+
+
+
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
--- cvrf-opensuse-su-2024:14432-1.xml 1970-01-01 01:00:00.000000000 +0100
+++ cvrf-opensuse-su-2024:14432-1.xml.new.formatted 2024-10-29 08:22:54.697041000 +0100
@@ -0,0 +1,263 @@
+
+
+ java-11-openjdk-11.0.25.0-1.1 on GA media
+ SUSE Patch
+
+ security@suse.de
+ SUSE Security Team
+
+
+
+ openSUSE-SU-2024:14432-1
+
+ Final
+ 1
+
+
+ 1
+ 2024-10-28T00:00:00Z
+ current
+
+
+ 2024-10-28T00:00:00Z
+ 2024-10-28T00:00:00Z
+
+ cve-database/bin/generate-cvrf.pl
+ 2017-02-24T01:00:00Z
+
+
+
+ java-11-openjdk-11.0.25.0-1.1 on GA media
+ These are all security issues fixed in the java-11-openjdk-11.0.25.0-1.1 package on the GA media of openSUSE Tumbleweed.
+ The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
+ openSUSE-Tumbleweed-2024-14432
+
+ Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
+
+
+ https://www.suse.com/support/security/rating/
+ SUSE Security Ratings
+
+
+ https://www.suse.com/security/cve/CVE-2024-21208/
+ SUSE CVE CVE-2024-21208 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-21210/
+ SUSE CVE CVE-2024-21210 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-21217/
+ SUSE CVE CVE-2024-21217 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-21235/
+ SUSE CVE CVE-2024-21235 page
+
+
+
+
+
+ openSUSE Tumbleweed
+
+
+
+ java-11-openjdk-11.0.25.0-1.1
+
+
+ java-11-openjdk-demo-11.0.25.0-1.1
+
+
+ java-11-openjdk-devel-11.0.25.0-1.1
+
+
+ java-11-openjdk-headless-11.0.25.0-1.1
+
+
+ java-11-openjdk-javadoc-11.0.25.0-1.1
+
+
+ java-11-openjdk-jmods-11.0.25.0-1.1
+
+
+ java-11-openjdk-src-11.0.25.0-1.1
+
+
+ java-11-openjdk-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-demo-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-devel-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-headless-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-javadoc-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-jmods-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-src-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+
+
+ Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and 21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
+
+ CVE-2024-21208
+
+
+ openSUSE Tumbleweed:java-11-openjdk-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-demo-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-devel-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-headless-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-src-11.0.25.0-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-21208.html
+ CVE-2024-21208
+
+
+ https://bugzilla.suse.com/1231702
+ SUSE Bug 1231702
+
+
+
+
+
+ Vulnerability in Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4 and 23. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
+
+ CVE-2024-21210
+
+
+ openSUSE Tumbleweed:java-11-openjdk-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-demo-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-devel-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-headless-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-src-11.0.25.0-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-21210.html
+ CVE-2024-21210
+
+
+ https://bugzilla.suse.com/1231711
+ SUSE Bug 1231711
+
+
+
+
+
+ Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and 21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
+
+ CVE-2024-21217
+
+
+ openSUSE Tumbleweed:java-11-openjdk-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-demo-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-devel-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-headless-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-src-11.0.25.0-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-21217.html
+ CVE-2024-21217
+
+
+ https://bugzilla.suse.com/1231716
+ SUSE Bug 1231716
+
+
+
+
+
+ Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and 21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
+
+ CVE-2024-21235
+
+
+ openSUSE Tumbleweed:java-11-openjdk-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-demo-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-devel-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-headless-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-src-11.0.25.0-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-21235.html
+ CVE-2024-21235
+
+
+ https://bugzilla.suse.com/1231719
+ SUSE Bug 1231719
+
+
+
+
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
--- cvrf-opensuse-su-2024:14432-1.xml 1970-01-01 01:00:00.000000000 +0100
+++ cvrf-opensuse-su-2024:14432-1.xml.new.formatted 2024-10-29 08:22:55.061006000 +0100
@@ -0,0 +1,287 @@
+
+
+ java-11-openjdk-11.0.25.0-1.1 on GA media
+ SUSE Patch
+
+ security@suse.de
+ SUSE Security Team
+
+
+
+ openSUSE-SU-2024:14432-1
+
+ Final
+ 1
+
+
+ 1
+ 2024-10-28T00:00:00Z
+ current
+
+
+ 2024-10-28T00:00:00Z
+ 2024-10-28T00:00:00Z
+
+ cve-database/bin/generate-cvrf.pl
+ 2017-02-24T01:00:00Z
+
+
+
+ java-11-openjdk-11.0.25.0-1.1 on GA media
+ These are all security issues fixed in the java-11-openjdk-11.0.25.0-1.1 package on the GA media of openSUSE Tumbleweed.
+ The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
+ openSUSE-Tumbleweed-2024-14432
+
+ Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
+
+
+ https://www.suse.com/support/security/rating/
+ SUSE Security Ratings
+
+
+ https://www.suse.com/security/cve/CVE-2024-21208/
+ SUSE CVE CVE-2024-21208 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-21210/
+ SUSE CVE CVE-2024-21210 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-21217/
+ SUSE CVE CVE-2024-21217 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-21235/
+ SUSE CVE CVE-2024-21235 page
+
+
+
+
+
+ openSUSE Tumbleweed
+
+
+
+ java-11-openjdk-11.0.25.0-1.1
+
+
+ java-11-openjdk-demo-11.0.25.0-1.1
+
+
+ java-11-openjdk-devel-11.0.25.0-1.1
+
+
+ java-11-openjdk-headless-11.0.25.0-1.1
+
+
+ java-11-openjdk-javadoc-11.0.25.0-1.1
+
+
+ java-11-openjdk-jmods-11.0.25.0-1.1
+
+
+ java-11-openjdk-src-11.0.25.0-1.1
+
+
+ java-11-openjdk-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-demo-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-devel-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-headless-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-javadoc-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-jmods-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+ java-11-openjdk-src-11.0.25.0-1.1 as a component of openSUSE Tumbleweed
+
+
+
+
+ Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and 21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
+
+ CVE-2024-21208
+
+
+ openSUSE Tumbleweed:java-11-openjdk-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-demo-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-devel-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-headless-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-src-11.0.25.0-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 3.7
+ CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-21208.html
+ CVE-2024-21208
+
+
+ https://bugzilla.suse.com/1231702
+ SUSE Bug 1231702
+
+
+
+
+
+ Vulnerability in Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4 and 23. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
+
+ CVE-2024-21210
+
+
+ openSUSE Tumbleweed:java-11-openjdk-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-demo-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-devel-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-headless-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-src-11.0.25.0-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 3.7
+ CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-21210.html
+ CVE-2024-21210
+
+
+ https://bugzilla.suse.com/1231711
+ SUSE Bug 1231711
+
+
+
+
+
+ Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and 21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
+
+ CVE-2024-21217
+
+
+ openSUSE Tumbleweed:java-11-openjdk-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-demo-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-devel-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-headless-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-src-11.0.25.0-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 3.7
+ CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-21217.html
+ CVE-2024-21217
+
+
+ https://bugzilla.suse.com/1231716
+ SUSE Bug 1231716
+
+
+
+
+
+ Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and 21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
+
+ CVE-2024-21235
+
+
+ openSUSE Tumbleweed:java-11-openjdk-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-demo-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-devel-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-headless-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.25.0-1.1
+ openSUSE Tumbleweed:java-11-openjdk-src-11.0.25.0-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 4.8
+ CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-21235.html
+ CVE-2024-21235
+
+
+ https://bugzilla.suse.com/1231719
+ SUSE Bug 1231719
+
+
+
+
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
--- cvrf-opensuse-su-2024:14433-1.xml 1970-01-01 01:00:00.000000000 +0100
+++ cvrf-opensuse-su-2024:14433-1.xml.new.formatted 2024-10-29 08:22:55.375989000 +0100
@@ -0,0 +1,106 @@
+
+
+ python310-pytest-html-4.1.1-3.1 on GA media
+ SUSE Patch
+
+ security@suse.de
+ SUSE Security Team
+
+
+
+ openSUSE-SU-2024:14433-1
+
+ Final
+ 1
+
+
+ 1
+ 2024-10-28T00:00:00Z
+ current
+
+
+ 2024-10-28T00:00:00Z
+ 2024-10-28T00:00:00Z
+
+ cve-database/bin/generate-cvrf.pl
+ 2017-02-24T01:00:00Z
+
+
+
+ python310-pytest-html-4.1.1-3.1 on GA media
+ These are all security issues fixed in the python310-pytest-html-4.1.1-3.1 package on the GA media of openSUSE Tumbleweed.
+ The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
+ openSUSE-Tumbleweed-2024-14433
+
+ Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
+
+
+ https://www.suse.com/support/security/rating/
+ SUSE Security Ratings
+
+
+ https://www.suse.com/security/cve/CVE-2024-48948/
+ SUSE CVE CVE-2024-48948 page
+
+
+
+
+
+ openSUSE Tumbleweed
+
+
+
+ python310-pytest-html-4.1.1-3.1
+
+
+ python311-pytest-html-4.1.1-3.1
+
+
+ python312-pytest-html-4.1.1-3.1
+
+
+ python310-pytest-html-4.1.1-3.1 as a component of openSUSE Tumbleweed
+
+
+ python311-pytest-html-4.1.1-3.1 as a component of openSUSE Tumbleweed
+
+
+ python312-pytest-html-4.1.1-3.1 as a component of openSUSE Tumbleweed
+
+
+
+
+ The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.
+
+ CVE-2024-48948
+
+
+ openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1
+ openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1
+ openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-48948.html
+ CVE-2024-48948
+
+
+ https://bugzilla.suse.com/1231681
+ SUSE Bug 1231681
+
+
+
+
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
--- cvrf-opensuse-su-2024:14433-1.xml 1970-01-01 01:00:00.000000000 +0100
+++ cvrf-opensuse-su-2024:14433-1.xml.new.formatted 2024-10-29 08:22:55.689972000 +0100
@@ -0,0 +1,112 @@
+
+
+ python310-pytest-html-4.1.1-3.1 on GA media
+ SUSE Patch
+
+ security@suse.de
+ SUSE Security Team
+
+
+
+ openSUSE-SU-2024:14433-1
+
+ Final
+ 1
+
+
+ 1
+ 2024-10-28T00:00:00Z
+ current
+
+
+ 2024-10-28T00:00:00Z
+ 2024-10-28T00:00:00Z
+
+ cve-database/bin/generate-cvrf.pl
+ 2017-02-24T01:00:00Z
+
+
+
+ python310-pytest-html-4.1.1-3.1 on GA media
+ These are all security issues fixed in the python310-pytest-html-4.1.1-3.1 package on the GA media of openSUSE Tumbleweed.
+ The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
+ openSUSE-Tumbleweed-2024-14433
+
+ Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
+
+
+ https://www.suse.com/support/security/rating/
+ SUSE Security Ratings
+
+
+ https://www.suse.com/security/cve/CVE-2024-48948/
+ SUSE CVE CVE-2024-48948 page
+
+
+
+
+
+ openSUSE Tumbleweed
+
+
+
+ python310-pytest-html-4.1.1-3.1
+
+
+ python311-pytest-html-4.1.1-3.1
+
+
+ python312-pytest-html-4.1.1-3.1
+
+
+ python310-pytest-html-4.1.1-3.1 as a component of openSUSE Tumbleweed
+
+
+ python311-pytest-html-4.1.1-3.1 as a component of openSUSE Tumbleweed
+
+
+ python312-pytest-html-4.1.1-3.1 as a component of openSUSE Tumbleweed
+
+
+
+
+ The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.
+
+ CVE-2024-48948
+
+
+ openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1
+ openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1
+ openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1
+
+
+
+
+ moderate
+
+
+
+
+ 4.8
+ CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-48948.html
+ CVE-2024-48948
+
+
+ https://bugzilla.suse.com/1231681
+ SUSE Bug 1231681
+
+
+
+
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
--- cvrf-opensuse-su-2024:14434-1.xml 1970-01-01 01:00:00.000000000 +0100
+++ cvrf-opensuse-su-2024:14434-1.xml.new.formatted 2024-10-29 08:22:56.129454000 +0100
@@ -0,0 +1,1923 @@
+
+
+ python314-3.14.0~a1-1.1 on GA media
+ SUSE Patch
+
+ security@suse.de
+ SUSE Security Team
+
+
+
+ openSUSE-SU-2024:14434-1
+
+ Final
+ 1
+
+
+ 1
+ 2024-10-28T00:00:00Z
+ current
+
+
+ 2024-10-28T00:00:00Z
+ 2024-10-28T00:00:00Z
+
+ cve-database/bin/generate-cvrf.pl
+ 2017-02-24T01:00:00Z
+
+
+
+ python314-3.14.0~a1-1.1 on GA media
+ These are all security issues fixed in the python314-3.14.0~a1-1.1 package on the GA media of openSUSE Tumbleweed.
+ The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
+ openSUSE-Tumbleweed-2024-14434
+
+ Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
+
+
+ https://www.suse.com/support/security/rating/
+ SUSE Security Ratings
+
+
+ https://www.suse.com/security/cve/CVE-2011-3389/
+ SUSE CVE CVE-2011-3389 page
+
+
+ https://www.suse.com/security/cve/CVE-2011-4944/
+ SUSE CVE CVE-2011-4944 page
+
+
+ https://www.suse.com/security/cve/CVE-2012-0845/
+ SUSE CVE CVE-2012-0845 page
+
+
+ https://www.suse.com/security/cve/CVE-2012-1150/
+ SUSE CVE CVE-2012-1150 page
+
+
+ https://www.suse.com/security/cve/CVE-2013-1752/
+ SUSE CVE CVE-2013-1752 page
+
+
+ https://www.suse.com/security/cve/CVE-2013-4238/
+ SUSE CVE CVE-2013-4238 page
+
+
+ https://www.suse.com/security/cve/CVE-2014-2667/
+ SUSE CVE CVE-2014-2667 page
+
+
+ https://www.suse.com/security/cve/CVE-2014-4650/
+ SUSE CVE CVE-2014-4650 page
+
+
+ https://www.suse.com/security/cve/CVE-2019-20907/
+ SUSE CVE CVE-2019-20907 page
+
+
+ https://www.suse.com/security/cve/CVE-2019-5010/
+ SUSE CVE CVE-2019-5010 page
+
+
+ https://www.suse.com/security/cve/CVE-2019-9947/
+ SUSE CVE CVE-2019-9947 page
+
+
+ https://www.suse.com/security/cve/CVE-2020-10735/
+ SUSE CVE CVE-2020-10735 page
+
+
+ https://www.suse.com/security/cve/CVE-2020-15523/
+ SUSE CVE CVE-2020-15523 page
+
+
+ https://www.suse.com/security/cve/CVE-2020-15801/
+ SUSE CVE CVE-2020-15801 page
+
+
+ https://www.suse.com/security/cve/CVE-2020-8492/
+ SUSE CVE CVE-2020-8492 page
+
+
+ https://www.suse.com/security/cve/CVE-2021-23336/
+ SUSE CVE CVE-2021-23336 page
+
+
+ https://www.suse.com/security/cve/CVE-2021-3177/
+ SUSE CVE CVE-2021-3177 page
+
+
+ https://www.suse.com/security/cve/CVE-2021-3426/
+ SUSE CVE CVE-2021-3426 page
+
+
+ https://www.suse.com/security/cve/CVE-2022-25236/
+ SUSE CVE CVE-2022-25236 page
+
+
+ https://www.suse.com/security/cve/CVE-2022-42919/
+ SUSE CVE CVE-2022-42919 page
+
+
+ https://www.suse.com/security/cve/CVE-2022-45061/
+ SUSE CVE CVE-2022-45061 page
+
+
+ https://www.suse.com/security/cve/CVE-2023-0286/
+ SUSE CVE CVE-2023-0286 page
+
+
+ https://www.suse.com/security/cve/CVE-2023-24329/
+ SUSE CVE CVE-2023-24329 page
+
+
+ https://www.suse.com/security/cve/CVE-2023-2650/
+ SUSE CVE CVE-2023-2650 page
+
+
+ https://www.suse.com/security/cve/CVE-2023-27043/
+ SUSE CVE CVE-2023-27043 page
+
+
+ https://www.suse.com/security/cve/CVE-2023-40217/
+ SUSE CVE CVE-2023-40217 page
+
+
+ https://www.suse.com/security/cve/CVE-2023-52425/
+ SUSE CVE CVE-2023-52425 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-4030/
+ SUSE CVE CVE-2024-4030 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-4032/
+ SUSE CVE CVE-2024-4032 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-6232/
+ SUSE CVE CVE-2024-6232 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-6923/
+ SUSE CVE CVE-2024-6923 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-7592/
+ SUSE CVE CVE-2024-7592 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-8088/
+ SUSE CVE CVE-2024-8088 page
+
+
+
+
+
+ openSUSE Tumbleweed
+
+
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+
+
+ The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
+
+ CVE-2011-3389
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 4.3
+ AV:N/AC:M/Au:N/C:P/I:N/A:N
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2011-3389.html
+ CVE-2011-3389
+
+
+ https://bugzilla.suse.com/716002
+ SUSE Bug 716002
+
+
+ https://bugzilla.suse.com/719047
+ SUSE Bug 719047
+
+
+ https://bugzilla.suse.com/725167
+ SUSE Bug 725167
+
+
+ https://bugzilla.suse.com/726096
+ SUSE Bug 726096
+
+
+ https://bugzilla.suse.com/739248
+ SUSE Bug 739248
+
+
+ https://bugzilla.suse.com/739256
+ SUSE Bug 739256
+
+
+ https://bugzilla.suse.com/742306
+ SUSE Bug 742306
+
+
+ https://bugzilla.suse.com/751718
+ SUSE Bug 751718
+
+
+ https://bugzilla.suse.com/759666
+ SUSE Bug 759666
+
+
+ https://bugzilla.suse.com/763598
+ SUSE Bug 763598
+
+
+ https://bugzilla.suse.com/814655
+ SUSE Bug 814655
+
+
+
+
+
+ Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.
+
+ CVE-2011-4944
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 1.9
+ AV:L/AC:M/Au:N/C:P/I:N/A:N
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2011-4944.html
+ CVE-2011-4944
+
+
+ https://bugzilla.suse.com/754447
+ SUSE Bug 754447
+
+
+
+
+
+ SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.
+
+ CVE-2012-0845
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 5
+ AV:N/AC:L/Au:N/C:N/I:N/A:P
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2012-0845.html
+ CVE-2012-0845
+
+
+ https://bugzilla.suse.com/747125
+ SUSE Bug 747125
+
+
+
+
+
+ Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
+
+ CVE-2012-1150
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 5
+ AV:N/AC:L/Au:N/C:N/I:N/A:P
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2012-1150.html
+ CVE-2012-1150
+
+
+ https://bugzilla.suse.com/751718
+ SUSE Bug 751718
+
+
+ https://bugzilla.suse.com/755383
+ SUSE Bug 755383
+
+
+ https://bugzilla.suse.com/826682
+ SUSE Bug 826682
+
+
+
+
+
+ ** REJECT ** Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 "Independently Fixable" in the CVE Counting Decisions.
+
+ CVE-2013-1752
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2013-1752.html
+ CVE-2013-1752
+
+
+ https://bugzilla.suse.com/856835
+ SUSE Bug 856835
+
+
+ https://bugzilla.suse.com/856836
+ SUSE Bug 856836
+
+
+ https://bugzilla.suse.com/863741
+ SUSE Bug 863741
+
+
+ https://bugzilla.suse.com/885882
+ SUSE Bug 885882
+
+
+ https://bugzilla.suse.com/898572
+ SUSE Bug 898572
+
+
+ https://bugzilla.suse.com/912739
+ SUSE Bug 912739
+
+
+
+
+
+ The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
+
+ CVE-2013-4238
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 4.3
+ AV:N/AC:M/Au:N/C:N/I:P/A:N
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2013-4238.html
+ CVE-2013-4238
+
+
+ https://bugzilla.suse.com/834601
+ SUSE Bug 834601
+
+
+ https://bugzilla.suse.com/839107
+ SUSE Bug 839107
+
+
+ https://bugzilla.suse.com/882915
+ SUSE Bug 882915
+
+
+ https://bugzilla.suse.com/912739
+ SUSE Bug 912739
+
+
+
+
+
+ Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.
+
+ CVE-2014-2667
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 3.3
+ AV:L/AC:M/Au:N/C:P/I:P/A:N
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2014-2667.html
+ CVE-2014-2667
+
+
+ https://bugzilla.suse.com/871152
+ SUSE Bug 871152
+
+
+
+
+
+ The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.
+
+ CVE-2014-4650
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 7.5
+ AV:N/AC:L/Au:N/C:P/I:P/A:P
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2014-4650.html
+ CVE-2014-4650
+
+
+ https://bugzilla.suse.com/856835
+ SUSE Bug 856835
+
+
+ https://bugzilla.suse.com/856836
+ SUSE Bug 856836
+
+
+ https://bugzilla.suse.com/863741
+ SUSE Bug 863741
+
+
+ https://bugzilla.suse.com/885882
+ SUSE Bug 885882
+
+
+ https://bugzilla.suse.com/898572
+ SUSE Bug 898572
+
+
+ https://bugzilla.suse.com/912739
+ SUSE Bug 912739
+
+
+
+
+
+ In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
+
+ CVE-2019-20907
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 5
+ AV:N/AC:L/Au:N/C:N/I:N/A:P
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2019-20907.html
+ CVE-2019-20907
+
+
+ https://bugzilla.suse.com/1174091
+ SUSE Bug 1174091
+
+
+
+
+
+ An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.
+
+ CVE-2019-5010
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 5
+ AV:N/AC:L/Au:N/C:N/I:N/A:P
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2019-5010.html
+ CVE-2019-5010
+
+
+ https://bugzilla.suse.com/1122191
+ SUSE Bug 1122191
+
+
+ https://bugzilla.suse.com/1126909
+ SUSE Bug 1126909
+
+
+
+
+
+ An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
+
+ CVE-2019-9947
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 4.3
+ AV:N/AC:M/Au:N/C:N/I:P/A:N
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2019-9947.html
+ CVE-2019-9947
+
+
+ https://bugzilla.suse.com/1130840
+ SUSE Bug 1130840
+
+
+ https://bugzilla.suse.com/1136184
+ SUSE Bug 1136184
+
+
+ https://bugzilla.suse.com/1155094
+ SUSE Bug 1155094
+
+
+ https://bugzilla.suse.com/1201559
+ SUSE Bug 1201559
+
+
+
+
+
+ A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.
+
+ CVE-2020-10735
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2020-10735.html
+ CVE-2020-10735
+
+
+ https://bugzilla.suse.com/1203125
+ SUSE Bug 1203125
+
+
+ https://bugzilla.suse.com/1204077
+ SUSE Bug 1204077
+
+
+ https://bugzilla.suse.com/1204096
+ SUSE Bug 1204096
+
+
+ https://bugzilla.suse.com/1204097
+ SUSE Bug 1204097
+
+
+ https://bugzilla.suse.com/1205075
+ SUSE Bug 1205075
+
+
+ https://bugzilla.suse.com/1208131
+ SUSE Bug 1208131
+
+
+
+
+
+ In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.
+
+ CVE-2020-15523
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 6.9
+ AV:L/AC:M/Au:N/C:C/I:C/A:C
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2020-15523.html
+ CVE-2020-15523
+
+
+ https://bugzilla.suse.com/1173745
+ SUSE Bug 1173745
+
+
+
+
+
+ In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The <executable-name>._pth file (e.g., the python._pth file) is not affected.
+
+ CVE-2020-15801
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 7.5
+ AV:N/AC:L/Au:N/C:P/I:P/A:P
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2020-15801.html
+ CVE-2020-15801
+
+
+ https://bugzilla.suse.com/1174241
+ SUSE Bug 1174241
+
+
+
+
+
+ Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
+
+ CVE-2020-8492
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 7.1
+ AV:N/AC:M/Au:N/C:N/I:N/A:C
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2020-8492.html
+ CVE-2020-8492
+
+
+ https://bugzilla.suse.com/1162367
+ SUSE Bug 1162367
+
+
+
+
+
+ The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
+
+ CVE-2021-23336
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 4
+ AV:N/AC:H/Au:N/C:N/I:P/A:P
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2021-23336.html
+ CVE-2021-23336
+
+
+ https://bugzilla.suse.com/1182179
+ SUSE Bug 1182179
+
+
+ https://bugzilla.suse.com/1182379
+ SUSE Bug 1182379
+
+
+ https://bugzilla.suse.com/1182433
+ SUSE Bug 1182433
+
+
+
+
+
+ Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
+
+ CVE-2021-3177
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 7.5
+ AV:N/AC:L/Au:N/C:P/I:P/A:P
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2021-3177.html
+ CVE-2021-3177
+
+
+ https://bugzilla.suse.com/1181126
+ SUSE Bug 1181126
+
+
+
+
+
+ There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.
+
+ CVE-2021-3426
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 2.7
+ AV:A/AC:L/Au:S/C:P/I:N/A:N
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2021-3426.html
+ CVE-2021-3426
+
+
+ https://bugzilla.suse.com/1183374
+ SUSE Bug 1183374
+
+
+
+
+
+ xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.
+
+ CVE-2022-25236
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 7.5
+ AV:N/AC:L/Au:N/C:P/I:P/A:P
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2022-25236.html
+ CVE-2022-25236
+
+
+ https://bugzilla.suse.com/1196025
+ SUSE Bug 1196025
+
+
+ https://bugzilla.suse.com/1196784
+ SUSE Bug 1196784
+
+
+ https://bugzilla.suse.com/1197217
+ SUSE Bug 1197217
+
+
+ https://bugzilla.suse.com/1200038
+ SUSE Bug 1200038
+
+
+ https://bugzilla.suse.com/1201735
+ SUSE Bug 1201735
+
+
+
+
+
+ Python 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in many system configurations means any user on the same machine. Pickles can execute arbitrary code. Thus, this allows for local user privilege escalation to the user that any forkserver process is running as. Setting multiprocessing.util.abstract_sockets_supported to False is a workaround. The forkserver start method for multiprocessing is not the default start method. This issue is Linux specific because only Linux supports abstract namespace sockets. CPython before 3.9 does not make use of Linux abstract namespace sockets by default. Support for users manually specifying an abstract namespace socket was added as a bugfix in 3.7.8 and 3.8.3, but users would need to make specific uncommon API calls in order to do that in CPython before 3.9.
+
+ CVE-2022-42919
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2022-42919.html
+ CVE-2022-42919
+
+
+ https://bugzilla.suse.com/1204886
+ SUSE Bug 1204886
+
+
+
+
+
+ An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.
+
+ CVE-2022-45061
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2022-45061.html
+ CVE-2022-45061
+
+
+ https://bugzilla.suse.com/1205244
+ SUSE Bug 1205244
+
+
+ https://bugzilla.suse.com/1211488
+ SUSE Bug 1211488
+
+
+
+
+
+ There is a type confusion vulnerability relating to X.400 address processing
+inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but
+the public structure definition for GENERAL_NAME incorrectly specified the type
+of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by
+the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an
+ASN1_STRING.
+
+When CRL checking is enabled (i.e. the application sets the
+X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass
+arbitrary pointers to a memcmp call, enabling them to read memory contents or
+enact a denial of service. In most cases, the attack requires the attacker to
+provide both the certificate chain and CRL, neither of which need to have a
+valid signature. If the attacker only controls one of these inputs, the other
+input must already contain an X.400 address as a CRL distribution point, which
+is uncommon. As such, this vulnerability is most likely to only affect
+applications which have implemented their own functionality for retrieving CRLs
+over a network.
+
+
+
+ CVE-2023-0286
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2023-0286.html
+ CVE-2023-0286
+
+
+ https://bugzilla.suse.com/1207533
+ SUSE Bug 1207533
+
+
+ https://bugzilla.suse.com/1207569
+ SUSE Bug 1207569
+
+
+ https://bugzilla.suse.com/1211136
+ SUSE Bug 1211136
+
+
+ https://bugzilla.suse.com/1211503
+ SUSE Bug 1211503
+
+
+ https://bugzilla.suse.com/1213146
+ SUSE Bug 1213146
+
+
+ https://bugzilla.suse.com/1214269
+ SUSE Bug 1214269
+
+
+ https://bugzilla.suse.com/1218477
+ SUSE Bug 1218477
+
+
+ https://bugzilla.suse.com/1218967
+ SUSE Bug 1218967
+
+
+ https://bugzilla.suse.com/1225677
+ SUSE Bug 1225677
+
+
+
+
+
+ An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
+
+ CVE-2023-24329
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2023-24329.html
+ CVE-2023-24329
+
+
+ https://bugzilla.suse.com/1208471
+ SUSE Bug 1208471
+
+
+ https://bugzilla.suse.com/1213553
+ SUSE Bug 1213553
+
+
+ https://bugzilla.suse.com/1213554
+ SUSE Bug 1213554
+
+
+ https://bugzilla.suse.com/1213839
+ SUSE Bug 1213839
+
+
+ https://bugzilla.suse.com/1225672
+ SUSE Bug 1225672
+
+
+
+
+
+ Issue summary: Processing some specially crafted ASN.1 object identifiers or
+data containing them may be very slow.
+
+Impact summary: Applications that use OBJ_obj2txt() directly, or use any of
+the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message
+size limit may experience notable to very long delays when processing those
+messages, which may lead to a Denial of Service.
+
+An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers -
+most of which have no size limit. OBJ_obj2txt() may be used to translate
+an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL
+type ASN1_OBJECT) to its canonical numeric text form, which are the
+sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by
+periods.
+
+When one of the sub-identifiers in the OBJECT IDENTIFIER is very large
+(these are sizes that are seen as absurdly large, taking up tens or hundreds
+of KiBs), the translation to a decimal number in text may take a very long
+time. The time complexity is O(n^2) with 'n' being the size of the
+sub-identifiers in bytes (*).
+
+With OpenSSL 3.0, support to fetch cryptographic algorithms using names /
+identifiers in string form was introduced. This includes using OBJECT
+IDENTIFIERs in canonical numeric text form as identifiers for fetching
+algorithms.
+
+Such OBJECT IDENTIFIERs may be received through the ASN.1 structure
+AlgorithmIdentifier, which is commonly used in multiple protocols to specify
+what cryptographic algorithm should be used to sign or verify, encrypt or
+decrypt, or digest passed data.
+
+Applications that call OBJ_obj2txt() directly with untrusted data are
+affected, with any version of OpenSSL. If the use is for the mere purpose
+of display, the severity is considered low.
+
+In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME,
+CMS, CMP/CRMF or TS. It also impacts anything that processes X.509
+certificates, including simple things like verifying its signature.
+
+The impact on TLS is relatively low, because all versions of OpenSSL have a
+100KiB limit on the peer's certificate chain. Additionally, this only
+impacts clients, or servers that have explicitly enabled client
+authentication.
+
+In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects,
+such as X.509 certificates. This is assumed to not happen in such a way
+that it would cause a Denial of Service, so these versions are considered
+not affected by this issue in such a way that it would be cause for concern,
+and the severity is therefore considered low.
+
+ CVE-2023-2650
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2023-2650.html
+ CVE-2023-2650
+
+
+ https://bugzilla.suse.com/1211430
+ SUSE Bug 1211430
+
+
+
+
+
+ The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.
+
+ CVE-2023-27043
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2023-27043.html
+ CVE-2023-27043
+
+
+ https://bugzilla.suse.com/1210638
+ SUSE Bug 1210638
+
+
+ https://bugzilla.suse.com/1222537
+ SUSE Bug 1222537
+
+
+
+
+
+ An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)
+
+ CVE-2023-40217
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2023-40217.html
+ CVE-2023-40217
+
+
+ https://bugzilla.suse.com/1214692
+ SUSE Bug 1214692
+
+
+ https://bugzilla.suse.com/1217524
+ SUSE Bug 1217524
+
+
+ https://bugzilla.suse.com/1218319
+ SUSE Bug 1218319
+
+
+ https://bugzilla.suse.com/1218476
+ SUSE Bug 1218476
+
+
+ https://bugzilla.suse.com/1218965
+ SUSE Bug 1218965
+
+
+ https://bugzilla.suse.com/1219472
+ SUSE Bug 1219472
+
+
+ https://bugzilla.suse.com/1219713
+ SUSE Bug 1219713
+
+
+ https://bugzilla.suse.com/1221582
+ SUSE Bug 1221582
+
+
+ https://bugzilla.suse.com/1224883
+ SUSE Bug 1224883
+
+
+
+
+
+ libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.
+
+ CVE-2023-52425
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2023-52425.html
+ CVE-2023-52425
+
+
+ https://bugzilla.suse.com/1219559
+ SUSE Bug 1219559
+
+
+
+
+
+ On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.
+
+If you're not using Windows or haven't changed the temporary directory location then you aren't affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.
+
+This issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix "700" for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.
+
+ CVE-2024-4030
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-4030.html
+ CVE-2024-4030
+
+
+ https://bugzilla.suse.com/1227152
+ SUSE Bug 1227152
+
+
+
+
+
+ The "ipaddress" module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as "globally reachable" or "private". This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn't be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.
+
+CPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.
+
+ CVE-2024-4032
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-4032.html
+ CVE-2024-4032
+
+
+ https://bugzilla.suse.com/1226448
+ SUSE Bug 1226448
+
+
+
+
+
+ There is a MEDIUM severity vulnerability affecting CPython.
+
+
+
+
+
+Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.
+
+ CVE-2024-6232
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-6232.html
+ CVE-2024-6232
+
+
+ https://bugzilla.suse.com/1230227
+ SUSE Bug 1230227
+
+
+
+
+
+ There is a MEDIUM severity vulnerability affecting CPython.
+
+The
+email module didn't properly quote newlines for email headers when
+serializing an email message allowing for header injection when an email
+ is serialized.
+
+ CVE-2024-6923
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-6923.html
+ CVE-2024-6923
+
+
+ https://bugzilla.suse.com/1228780
+ SUSE Bug 1228780
+
+
+
+
+
+ There is a LOW severity vulnerability affecting CPython, specifically the
+'http.cookies' standard library module.
+
+
+When parsing cookies that contained backslashes for quoted characters in
+the cookie value, the parser would use an algorithm with quadratic
+complexity, resulting in excess CPU resources being used while parsing the
+value.
+
+ CVE-2024-7592
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-7592.html
+ CVE-2024-7592
+
+
+ https://bugzilla.suse.com/1229596
+ SUSE Bug 1229596
+
+
+
+
+
+ There is a HIGH severity vulnerability affecting the CPython "zipfile"
+module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected.
+
+
+
+
+
+When iterating over names of entries in a zip archive (for example, methods
+of "zipfile.Path" like "namelist()", "iterdir()", etc)
+the process can be put into an infinite loop with a maliciously crafted
+zip archive. This defect applies when reading only metadata or extracting
+the contents of the zip archive. Programs that are not handling
+user-controlled zip archives are not affected.
+
+ CVE-2024-8088
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-8088.html
+ CVE-2024-8088
+
+
+ https://bugzilla.suse.com/1229704
+ SUSE Bug 1229704
+
+
+
+
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
Use of uninitialized value $_[0] in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 819.
Use of uninitialized value $data in pattern match (m//) at /usr/lib/perl5/vendor_perl/5.18.2/XML/Writer.pm line 352.
Use of uninitialized value $_[0] in print at /usr/lib/perl5/5.18.2/x86_64-linux-thread-multi/IO/Handle.pm line 420.
--- cvrf-opensuse-su-2024:14434-1.xml 1970-01-01 01:00:00.000000000 +0100
+++ cvrf-opensuse-su-2024:14434-1.xml.new.formatted 2024-10-29 08:22:56.452466000 +0100
@@ -0,0 +1,2087 @@
+
+
+ python314-3.14.0~a1-1.1 on GA media
+ SUSE Patch
+
+ security@suse.de
+ SUSE Security Team
+
+
+
+ openSUSE-SU-2024:14434-1
+
+ Final
+ 1
+
+
+ 1
+ 2024-10-28T00:00:00Z
+ current
+
+
+ 2024-10-28T00:00:00Z
+ 2024-10-28T00:00:00Z
+
+ cve-database/bin/generate-cvrf.pl
+ 2017-02-24T01:00:00Z
+
+
+
+ python314-3.14.0~a1-1.1 on GA media
+ These are all security issues fixed in the python314-3.14.0~a1-1.1 package on the GA media of openSUSE Tumbleweed.
+ The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
+ openSUSE-Tumbleweed-2024-14434
+
+ Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
+
+
+ https://www.suse.com/support/security/rating/
+ SUSE Security Ratings
+
+
+ https://www.suse.com/security/cve/CVE-2011-3389/
+ SUSE CVE CVE-2011-3389 page
+
+
+ https://www.suse.com/security/cve/CVE-2011-4944/
+ SUSE CVE CVE-2011-4944 page
+
+
+ https://www.suse.com/security/cve/CVE-2012-0845/
+ SUSE CVE CVE-2012-0845 page
+
+
+ https://www.suse.com/security/cve/CVE-2012-1150/
+ SUSE CVE CVE-2012-1150 page
+
+
+ https://www.suse.com/security/cve/CVE-2013-1752/
+ SUSE CVE CVE-2013-1752 page
+
+
+ https://www.suse.com/security/cve/CVE-2013-4238/
+ SUSE CVE CVE-2013-4238 page
+
+
+ https://www.suse.com/security/cve/CVE-2014-2667/
+ SUSE CVE CVE-2014-2667 page
+
+
+ https://www.suse.com/security/cve/CVE-2014-4650/
+ SUSE CVE CVE-2014-4650 page
+
+
+ https://www.suse.com/security/cve/CVE-2019-20907/
+ SUSE CVE CVE-2019-20907 page
+
+
+ https://www.suse.com/security/cve/CVE-2019-5010/
+ SUSE CVE CVE-2019-5010 page
+
+
+ https://www.suse.com/security/cve/CVE-2019-9947/
+ SUSE CVE CVE-2019-9947 page
+
+
+ https://www.suse.com/security/cve/CVE-2020-10735/
+ SUSE CVE CVE-2020-10735 page
+
+
+ https://www.suse.com/security/cve/CVE-2020-15523/
+ SUSE CVE CVE-2020-15523 page
+
+
+ https://www.suse.com/security/cve/CVE-2020-15801/
+ SUSE CVE CVE-2020-15801 page
+
+
+ https://www.suse.com/security/cve/CVE-2020-8492/
+ SUSE CVE CVE-2020-8492 page
+
+
+ https://www.suse.com/security/cve/CVE-2021-23336/
+ SUSE CVE CVE-2021-23336 page
+
+
+ https://www.suse.com/security/cve/CVE-2021-3177/
+ SUSE CVE CVE-2021-3177 page
+
+
+ https://www.suse.com/security/cve/CVE-2021-3426/
+ SUSE CVE CVE-2021-3426 page
+
+
+ https://www.suse.com/security/cve/CVE-2022-25236/
+ SUSE CVE CVE-2022-25236 page
+
+
+ https://www.suse.com/security/cve/CVE-2022-42919/
+ SUSE CVE CVE-2022-42919 page
+
+
+ https://www.suse.com/security/cve/CVE-2022-45061/
+ SUSE CVE CVE-2022-45061 page
+
+
+ https://www.suse.com/security/cve/CVE-2023-0286/
+ SUSE CVE CVE-2023-0286 page
+
+
+ https://www.suse.com/security/cve/CVE-2023-24329/
+ SUSE CVE CVE-2023-24329 page
+
+
+ https://www.suse.com/security/cve/CVE-2023-2650/
+ SUSE CVE CVE-2023-2650 page
+
+
+ https://www.suse.com/security/cve/CVE-2023-27043/
+ SUSE CVE CVE-2023-27043 page
+
+
+ https://www.suse.com/security/cve/CVE-2023-40217/
+ SUSE CVE CVE-2023-40217 page
+
+
+ https://www.suse.com/security/cve/CVE-2023-52425/
+ SUSE CVE CVE-2023-52425 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-4030/
+ SUSE CVE CVE-2024-4030 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-4032/
+ SUSE CVE CVE-2024-4032 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-6232/
+ SUSE CVE CVE-2024-6232 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-6923/
+ SUSE CVE CVE-2024-6923 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-7592/
+ SUSE CVE CVE-2024-7592 page
+
+
+ https://www.suse.com/security/cve/CVE-2024-8088/
+ SUSE CVE CVE-2024-8088 page
+
+
+
+
+
+ openSUSE Tumbleweed
+
+
+
+ python314-3.14.0~a1-1.1
+
+
+ python314-curses-3.14.0~a1-1.1
+
+
+ python314-dbm-3.14.0~a1-1.1
+
+
+ python314-idle-3.14.0~a1-1.1
+
+
+ python314-tk-3.14.0~a1-1.1
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1
+
+
+ python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+ python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed
+
+
+
+
+ The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
+
+ CVE-2011-3389
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 4.3
+ AV:N/AC:M/Au:N/C:P/I:N/A:N
+
+
+ 3.7
+ CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2011-3389.html
+ CVE-2011-3389
+
+
+ https://bugzilla.suse.com/716002
+ SUSE Bug 716002
+
+
+ https://bugzilla.suse.com/719047
+ SUSE Bug 719047
+
+
+ https://bugzilla.suse.com/725167
+ SUSE Bug 725167
+
+
+ https://bugzilla.suse.com/726096
+ SUSE Bug 726096
+
+
+ https://bugzilla.suse.com/739248
+ SUSE Bug 739248
+
+
+ https://bugzilla.suse.com/739256
+ SUSE Bug 739256
+
+
+ https://bugzilla.suse.com/742306
+ SUSE Bug 742306
+
+
+ https://bugzilla.suse.com/751718
+ SUSE Bug 751718
+
+
+ https://bugzilla.suse.com/759666
+ SUSE Bug 759666
+
+
+ https://bugzilla.suse.com/763598
+ SUSE Bug 763598
+
+
+ https://bugzilla.suse.com/814655
+ SUSE Bug 814655
+
+
+
+
+
+ Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.
+
+ CVE-2011-4944
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ low
+
+
+
+
+ 1.9
+ AV:L/AC:M/Au:N/C:P/I:N/A:N
+
+
+ 3.3
+ CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2011-4944.html
+ CVE-2011-4944
+
+
+ https://bugzilla.suse.com/754447
+ SUSE Bug 754447
+
+
+
+
+
+ SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.
+
+ CVE-2012-0845
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 5
+ AV:N/AC:L/Au:N/C:N/I:N/A:P
+
+
+ 5.3
+ CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2012-0845.html
+ CVE-2012-0845
+
+
+ https://bugzilla.suse.com/747125
+ SUSE Bug 747125
+
+
+
+
+
+ Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
+
+ CVE-2012-1150
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 5
+ AV:N/AC:L/Au:N/C:N/I:N/A:P
+
+
+ 5.3
+ CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2012-1150.html
+ CVE-2012-1150
+
+
+ https://bugzilla.suse.com/751718
+ SUSE Bug 751718
+
+
+ https://bugzilla.suse.com/755383
+ SUSE Bug 755383
+
+
+ https://bugzilla.suse.com/826682
+ SUSE Bug 826682
+
+
+
+
+
+ ** REJECT ** Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 "Independently Fixable" in the CVE Counting Decisions.
+
+ CVE-2013-1752
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 5.3
+ CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2013-1752.html
+ CVE-2013-1752
+
+
+ https://bugzilla.suse.com/856835
+ SUSE Bug 856835
+
+
+ https://bugzilla.suse.com/856836
+ SUSE Bug 856836
+
+
+ https://bugzilla.suse.com/863741
+ SUSE Bug 863741
+
+
+ https://bugzilla.suse.com/885882
+ SUSE Bug 885882
+
+
+ https://bugzilla.suse.com/898572
+ SUSE Bug 898572
+
+
+ https://bugzilla.suse.com/912739
+ SUSE Bug 912739
+
+
+
+
+
+ The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
+
+ CVE-2013-4238
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 4.3
+ AV:N/AC:M/Au:N/C:N/I:P/A:N
+
+
+ 5.3
+ CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2013-4238.html
+ CVE-2013-4238
+
+
+ https://bugzilla.suse.com/834601
+ SUSE Bug 834601
+
+
+ https://bugzilla.suse.com/839107
+ SUSE Bug 839107
+
+
+ https://bugzilla.suse.com/882915
+ SUSE Bug 882915
+
+
+ https://bugzilla.suse.com/912739
+ SUSE Bug 912739
+
+
+
+
+
+ Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.
+
+ CVE-2014-2667
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 3.3
+ AV:L/AC:M/Au:N/C:P/I:P/A:N
+
+
+ 5.3
+ CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2014-2667.html
+ CVE-2014-2667
+
+
+ https://bugzilla.suse.com/871152
+ SUSE Bug 871152
+
+
+
+
+
+ The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.
+
+ CVE-2014-4650
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 7.5
+ AV:N/AC:L/Au:N/C:P/I:P/A:P
+
+
+ 5.3
+ CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2014-4650.html
+ CVE-2014-4650
+
+
+ https://bugzilla.suse.com/856835
+ SUSE Bug 856835
+
+
+ https://bugzilla.suse.com/856836
+ SUSE Bug 856836
+
+
+ https://bugzilla.suse.com/863741
+ SUSE Bug 863741
+
+
+ https://bugzilla.suse.com/885882
+ SUSE Bug 885882
+
+
+ https://bugzilla.suse.com/898572
+ SUSE Bug 898572
+
+
+ https://bugzilla.suse.com/912739
+ SUSE Bug 912739
+
+
+
+
+
+ In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
+
+ CVE-2019-20907
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 5
+ AV:N/AC:L/Au:N/C:N/I:N/A:P
+
+
+ 5.3
+ CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2019-20907.html
+ CVE-2019-20907
+
+
+ https://bugzilla.suse.com/1174091
+ SUSE Bug 1174091
+
+
+
+
+
+ An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.
+
+ CVE-2019-5010
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ important
+
+
+
+
+ 5
+ AV:N/AC:L/Au:N/C:N/I:N/A:P
+
+
+ 7.5
+ CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2019-5010.html
+ CVE-2019-5010
+
+
+ https://bugzilla.suse.com/1122191
+ SUSE Bug 1122191
+
+
+ https://bugzilla.suse.com/1126909
+ SUSE Bug 1126909
+
+
+
+
+
+ An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
+
+ CVE-2019-9947
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 4.3
+ AV:N/AC:M/Au:N/C:N/I:P/A:N
+
+
+ 5.4
+ CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2019-9947.html
+ CVE-2019-9947
+
+
+ https://bugzilla.suse.com/1130840
+ SUSE Bug 1130840
+
+
+ https://bugzilla.suse.com/1136184
+ SUSE Bug 1136184
+
+
+ https://bugzilla.suse.com/1155094
+ SUSE Bug 1155094
+
+
+ https://bugzilla.suse.com/1201559
+ SUSE Bug 1201559
+
+
+
+
+
+ A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.
+
+ CVE-2020-10735
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ important
+
+
+
+
+ 7.5
+ CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2020-10735.html
+ CVE-2020-10735
+
+
+ https://bugzilla.suse.com/1203125
+ SUSE Bug 1203125
+
+
+ https://bugzilla.suse.com/1204077
+ SUSE Bug 1204077
+
+
+ https://bugzilla.suse.com/1204096
+ SUSE Bug 1204096
+
+
+ https://bugzilla.suse.com/1204097
+ SUSE Bug 1204097
+
+
+ https://bugzilla.suse.com/1205075
+ SUSE Bug 1205075
+
+
+ https://bugzilla.suse.com/1208131
+ SUSE Bug 1208131
+
+
+
+
+
+ In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.
+
+ CVE-2020-15523
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ important
+
+
+
+
+ 6.9
+ AV:L/AC:M/Au:N/C:C/I:C/A:C
+
+
+ 7.8
+ CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2020-15523.html
+ CVE-2020-15523
+
+
+ https://bugzilla.suse.com/1173745
+ SUSE Bug 1173745
+
+
+
+
+
+ In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The <executable-name>._pth file (e.g., the python._pth file) is not affected.
+
+ CVE-2020-15801
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ critical
+
+
+
+
+ 7.5
+ AV:N/AC:L/Au:N/C:P/I:P/A:P
+
+
+ 9.8
+ CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2020-15801.html
+ CVE-2020-15801
+
+
+ https://bugzilla.suse.com/1174241
+ SUSE Bug 1174241
+
+
+
+
+
+ Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
+
+ CVE-2020-8492
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 7.1
+ AV:N/AC:M/Au:N/C:N/I:N/A:C
+
+
+ 6.5
+ CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2020-8492.html
+ CVE-2020-8492
+
+
+ https://bugzilla.suse.com/1162367
+ SUSE Bug 1162367
+
+
+
+
+
+ The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
+
+ CVE-2021-23336
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 4
+ AV:N/AC:H/Au:N/C:N/I:P/A:P
+
+
+ 5.9
+ CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2021-23336.html
+ CVE-2021-23336
+
+
+ https://bugzilla.suse.com/1182179
+ SUSE Bug 1182179
+
+
+ https://bugzilla.suse.com/1182379
+ SUSE Bug 1182379
+
+
+ https://bugzilla.suse.com/1182433
+ SUSE Bug 1182433
+
+
+
+
+
+ Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
+
+ CVE-2021-3177
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 7.5
+ AV:N/AC:L/Au:N/C:P/I:P/A:P
+
+
+ 5.9
+ CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2021-3177.html
+ CVE-2021-3177
+
+
+ https://bugzilla.suse.com/1181126
+ SUSE Bug 1181126
+
+
+
+
+
+ There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.
+
+ CVE-2021-3426
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 2.7
+ AV:A/AC:L/Au:S/C:P/I:N/A:N
+
+
+ 5.5
+ CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2021-3426.html
+ CVE-2021-3426
+
+
+ https://bugzilla.suse.com/1183374
+ SUSE Bug 1183374
+
+
+
+
+
+ xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.
+
+ CVE-2022-25236
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ important
+
+
+
+
+ 7.5
+ AV:N/AC:L/Au:N/C:P/I:P/A:P
+
+
+ 7.5
+ CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2022-25236.html
+ CVE-2022-25236
+
+
+ https://bugzilla.suse.com/1196025
+ SUSE Bug 1196025
+
+
+ https://bugzilla.suse.com/1196784
+ SUSE Bug 1196784
+
+
+ https://bugzilla.suse.com/1197217
+ SUSE Bug 1197217
+
+
+ https://bugzilla.suse.com/1200038
+ SUSE Bug 1200038
+
+
+ https://bugzilla.suse.com/1201735
+ SUSE Bug 1201735
+
+
+
+
+
+ Python 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in many system configurations means any user on the same machine. Pickles can execute arbitrary code. Thus, this allows for local user privilege escalation to the user that any forkserver process is running as. Setting multiprocessing.util.abstract_sockets_supported to False is a workaround. The forkserver start method for multiprocessing is not the default start method. This issue is Linux specific because only Linux supports abstract namespace sockets. CPython before 3.9 does not make use of Linux abstract namespace sockets by default. Support for users manually specifying an abstract namespace socket was added as a bugfix in 3.7.8 and 3.8.3, but users would need to make specific uncommon API calls in order to do that in CPython before 3.9.
+
+ CVE-2022-42919
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ important
+
+
+
+
+ 7.8
+ CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2022-42919.html
+ CVE-2022-42919
+
+
+ https://bugzilla.suse.com/1204886
+ SUSE Bug 1204886
+
+
+
+
+
+ An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.
+
+ CVE-2022-45061
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 6.5
+ CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2022-45061.html
+ CVE-2022-45061
+
+
+ https://bugzilla.suse.com/1205244
+ SUSE Bug 1205244
+
+
+ https://bugzilla.suse.com/1211488
+ SUSE Bug 1211488
+
+
+
+
+
+ There is a type confusion vulnerability relating to X.400 address processing
+inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but
+the public structure definition for GENERAL_NAME incorrectly specified the type
+of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by
+the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an
+ASN1_STRING.
+
+When CRL checking is enabled (i.e. the application sets the
+X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass
+arbitrary pointers to a memcmp call, enabling them to read memory contents or
+enact a denial of service. In most cases, the attack requires the attacker to
+provide both the certificate chain and CRL, neither of which need to have a
+valid signature. If the attacker only controls one of these inputs, the other
+input must already contain an X.400 address as a CRL distribution point, which
+is uncommon. As such, this vulnerability is most likely to only affect
+applications which have implemented their own functionality for retrieving CRLs
+over a network.
+
+
+
+ CVE-2023-0286
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ important
+
+
+
+
+ 7.4
+ CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2023-0286.html
+ CVE-2023-0286
+
+
+ https://bugzilla.suse.com/1207533
+ SUSE Bug 1207533
+
+
+ https://bugzilla.suse.com/1207569
+ SUSE Bug 1207569
+
+
+ https://bugzilla.suse.com/1211136
+ SUSE Bug 1211136
+
+
+ https://bugzilla.suse.com/1211503
+ SUSE Bug 1211503
+
+
+ https://bugzilla.suse.com/1213146
+ SUSE Bug 1213146
+
+
+ https://bugzilla.suse.com/1214269
+ SUSE Bug 1214269
+
+
+ https://bugzilla.suse.com/1218477
+ SUSE Bug 1218477
+
+
+ https://bugzilla.suse.com/1218967
+ SUSE Bug 1218967
+
+
+ https://bugzilla.suse.com/1225677
+ SUSE Bug 1225677
+
+
+
+
+
+ An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
+
+ CVE-2023-24329
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ important
+
+
+
+
+ 7.3
+ CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2023-24329.html
+ CVE-2023-24329
+
+
+ https://bugzilla.suse.com/1208471
+ SUSE Bug 1208471
+
+
+ https://bugzilla.suse.com/1213553
+ SUSE Bug 1213553
+
+
+ https://bugzilla.suse.com/1213554
+ SUSE Bug 1213554
+
+
+ https://bugzilla.suse.com/1213839
+ SUSE Bug 1213839
+
+
+ https://bugzilla.suse.com/1225672
+ SUSE Bug 1225672
+
+
+
+
+
+ Issue summary: Processing some specially crafted ASN.1 object identifiers or
+data containing them may be very slow.
+
+Impact summary: Applications that use OBJ_obj2txt() directly, or use any of
+the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message
+size limit may experience notable to very long delays when processing those
+messages, which may lead to a Denial of Service.
+
+An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers -
+most of which have no size limit. OBJ_obj2txt() may be used to translate
+an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL
+type ASN1_OBJECT) to its canonical numeric text form, which are the
+sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by
+periods.
+
+When one of the sub-identifiers in the OBJECT IDENTIFIER is very large
+(these are sizes that are seen as absurdly large, taking up tens or hundreds
+of KiBs), the translation to a decimal number in text may take a very long
+time. The time complexity is O(n^2) with 'n' being the size of the
+sub-identifiers in bytes (*).
+
+With OpenSSL 3.0, support to fetch cryptographic algorithms using names /
+identifiers in string form was introduced. This includes using OBJECT
+IDENTIFIERs in canonical numeric text form as identifiers for fetching
+algorithms.
+
+Such OBJECT IDENTIFIERs may be received through the ASN.1 structure
+AlgorithmIdentifier, which is commonly used in multiple protocols to specify
+what cryptographic algorithm should be used to sign or verify, encrypt or
+decrypt, or digest passed data.
+
+Applications that call OBJ_obj2txt() directly with untrusted data are
+affected, with any version of OpenSSL. If the use is for the mere purpose
+of display, the severity is considered low.
+
+In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME,
+CMS, CMP/CRMF or TS. It also impacts anything that processes X.509
+certificates, including simple things like verifying its signature.
+
+The impact on TLS is relatively low, because all versions of OpenSSL have a
+100KiB limit on the peer's certificate chain. Additionally, this only
+impacts clients, or servers that have explicitly enabled client
+authentication.
+
+In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects,
+such as X.509 certificates. This is assumed to not happen in such a way
+that it would cause a Denial of Service, so these versions are considered
+not affected by this issue in such a way that it would be cause for concern,
+and the severity is therefore considered low.
+
+ CVE-2023-2650
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 6.5
+ CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2023-2650.html
+ CVE-2023-2650
+
+
+ https://bugzilla.suse.com/1211430
+ SUSE Bug 1211430
+
+
+
+
+
+ The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.
+
+ CVE-2023-27043
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 5.3
+ CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2023-27043.html
+ CVE-2023-27043
+
+
+ https://bugzilla.suse.com/1210638
+ SUSE Bug 1210638
+
+
+ https://bugzilla.suse.com/1222537
+ SUSE Bug 1222537
+
+
+
+
+
+ An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)
+
+ CVE-2023-40217
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ important
+
+
+
+
+ 7.4
+ CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2023-40217.html
+ CVE-2023-40217
+
+
+ https://bugzilla.suse.com/1214692
+ SUSE Bug 1214692
+
+
+ https://bugzilla.suse.com/1217524
+ SUSE Bug 1217524
+
+
+ https://bugzilla.suse.com/1218319
+ SUSE Bug 1218319
+
+
+ https://bugzilla.suse.com/1218476
+ SUSE Bug 1218476
+
+
+ https://bugzilla.suse.com/1218965
+ SUSE Bug 1218965
+
+
+ https://bugzilla.suse.com/1219472
+ SUSE Bug 1219472
+
+
+ https://bugzilla.suse.com/1219713
+ SUSE Bug 1219713
+
+
+ https://bugzilla.suse.com/1221582
+ SUSE Bug 1221582
+
+
+ https://bugzilla.suse.com/1224883
+ SUSE Bug 1224883
+
+
+
+
+
+ libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.
+
+ CVE-2023-52425
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 5.5
+ CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2023-52425.html
+ CVE-2023-52425
+
+
+ https://bugzilla.suse.com/1219559
+ SUSE Bug 1219559
+
+
+
+
+
+ On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.
+
+If you're not using Windows or haven't changed the temporary directory location then you aren't affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.
+
+This issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix "700" for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.
+
+ CVE-2024-4030
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 4.4
+ CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-4030.html
+ CVE-2024-4030
+
+
+ https://bugzilla.suse.com/1227152
+ SUSE Bug 1227152
+
+
+
+
+
+ The "ipaddress" module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as "globally reachable" or "private". This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn't be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.
+
+CPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.
+
+ CVE-2024-4032
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ low
+
+
+
+
+ 3.7
+ CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-4032.html
+ CVE-2024-4032
+
+
+ https://bugzilla.suse.com/1226448
+ SUSE Bug 1226448
+
+
+
+
+
+ There is a MEDIUM severity vulnerability affecting CPython.
+
+
+
+
+
+Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.
+
+ CVE-2024-6232
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 7.5
+ CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-6232.html
+ CVE-2024-6232
+
+
+ https://bugzilla.suse.com/1230227
+ SUSE Bug 1230227
+
+
+
+
+
+ There is a MEDIUM severity vulnerability affecting CPython.
+
+The
+email module didn't properly quote newlines for email headers when
+serializing an email message allowing for header injection when an email
+ is serialized.
+
+ CVE-2024-6923
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ important
+
+
+
+
+ 7.5
+ CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-6923.html
+ CVE-2024-6923
+
+
+ https://bugzilla.suse.com/1228780
+ SUSE Bug 1228780
+
+
+
+
+
+ There is a LOW severity vulnerability affecting CPython, specifically the
+'http.cookies' standard library module.
+
+
+When parsing cookies that contained backslashes for quoted characters in
+the cookie value, the parser would use an algorithm with quadratic
+complexity, resulting in excess CPU resources being used while parsing the
+value.
+
+ CVE-2024-7592
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 2.6
+ CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-7592.html
+ CVE-2024-7592
+
+
+ https://bugzilla.suse.com/1229596
+ SUSE Bug 1229596
+
+
+
+
+
+ There is a HIGH severity vulnerability affecting the CPython "zipfile"
+module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected.
+
+
+
+
+
+When iterating over names of entries in a zip archive (for example, methods
+of "zipfile.Path" like "namelist()", "iterdir()", etc)
+the process can be put into an infinite loop with a maliciously crafted
+zip archive. This defect applies when reading only metadata or extracting
+the contents of the zip archive. Programs that are not handling
+user-controlled zip archives are not affected.
+
+ CVE-2024-8088
+
+
+ openSUSE Tumbleweed:python314-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1
+ openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1
+
+
+
+
+ moderate
+
+
+
+
+ 5.3
+ CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
+
+
+
+
+ To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
+
+
+
+
+
+
+ https://www.suse.com/security/cve/CVE-2024-8088.html
+ CVE-2024-8088
+
+
+ https://bugzilla.suse.com/1229704
+ SUSE Bug 1229704
+
+
+
+
SUCCESS