SUSE-SU-2025:20346-1: moderate: Security update for python311
SLE-SECURITY-UPDATES
null at suse.de
Thu May 29 16:31:49 UTC 2025
# Security update for python311
Announcement ID: SUSE-SU-2025:20346-1
Release Date: May 23, 2025, 1:55 p.m.
Rating: moderate
References:
* bsc#1236705
* bsc#1241067
Cross-References:
* CVE-2025-0938
CVSS scores:
* CVE-2025-0938 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
* CVE-2025-0938 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
* CVE-2025-0938 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Products:
* SUSE Linux Micro 6.0
An update that solves one vulnerability and has one fix can now be installed.
## Description:
This update for python311 fixes the following issues:
* Updated to 3.11.12:
* gh-131809: Updated bundled libexpat to 2.7.1
* gh-131261: Upgraded to libexpat 2.7.0
* CVE-2025-0938: Fixed functions `urllib.parse.urlsplit` and `urlparse`
accepting domain names including square brackets (bsc#1236705)
* gh-121284: Fixed bug in the folding of rfc2047 encoded-words when flattening
an email message using a modern email policy. Previously when an encoded-
word was too long for a line, it would be decoded, split across lines, and
re-encoded. But commas and other special characters in the original text
could be left unencoded and unquoted. This could theoretically be used to
spoof header lines using a carefully constructed encoded-word if the
resulting rendered email was transmitted or re-parsed.
* gh-80222: Fixed bug in the folding of quoted strings when flattening an
email message using a modern email policy. Previously when a quoted string
was folded so that it spanned more than one line, the surrounding quotes and
internal escapes would be omitted. This could theoretically be used to spoof
header lines using a carefully constructed quoted string if the resulting
rendered email was transmitted or re-parsed.
* gh-119511: Fixed a potential denial of service in the imaplib module. When
connecting to a malicious server, it could cause an arbitrary amount of
memory to be allocated. On many systems this is harmless as unused virtual
memory is only a mapping, but if this hit a virtual address size limit it
could lead to a MemoryError or other process crash. On unusual systems or
builds where all allocated memory is touched and backed by actual ram or
storage it could’ve consumed resources doing so until similarly crashing.
* gh-127257: In ssl, system call failures that OpenSSL reports using
ERR_LIB_SYS are now raised as OSError.
* gh-121277: Writers of CPython’s documentation can now use next as the
version for the versionchanged, versionadded, deprecated directives.
* gh-106883: Disabled GC during the _PyThread_CurrentFrames() and
_PyThread_CurrentExceptions() calls to avoid the interpreter to deadlock.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Micro 6.0
zypper in -t patch SUSE-SLE-Micro-6.0-336=1
## Package List:
* SUSE Linux Micro 6.0 (aarch64 s390x x86_64)
* python311-3.11.12-1.1
* python311-curses-debuginfo-3.11.12-1.1
* libpython3_11-1_0-3.11.12-1.1
* python311-core-debugsource-3.11.12-1.1
* python311-base-debuginfo-3.11.12-1.1
* python311-debuginfo-3.11.12-1.1
* python311-base-3.11.12-1.1
* python311-curses-3.11.12-1.1
* libpython3_11-1_0-debuginfo-3.11.12-1.1
* python311-debugsource-3.11.12-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-0938.html
* https://bugzilla.suse.com/show_bug.cgi?id=1236705
* https://bugzilla.suse.com/show_bug.cgi?id=1241067
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20250529/499f7155/attachment.htm>
More information about the sle-security-updates
mailing list