SUSE-SU-2025:20346-1: moderate: Security update for python311

SLE-SECURITY-UPDATES null at suse.de
Thu May 29 16:31:49 UTC 2025



# Security update for python311

Announcement ID: SUSE-SU-2025:20346-1  
Release Date: May 23, 2025, 1:55 p.m.  
Rating: moderate  
References:

  * bsc#1236705
  * bsc#1241067

  
Cross-References:

  * CVE-2025-0938

  
CVSS scores:

  * CVE-2025-0938 ( SUSE ):  6.3
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
  * CVE-2025-0938 ( SUSE ):  4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
  * CVE-2025-0938 ( NVD ):  6.3
    CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

  
Affected Products:

  * SUSE Linux Micro 6.0

  
  
An update that solves one vulnerability and has one fix can now be installed.

## Description:

This update for python311 fixes the following issues:

  * Updated to 3.11.12:
  * gh-131809: Updated bundled libexpat to 2.7.1
  * gh-131261: Upgraded to libexpat 2.7.0
  * CVE-2025-0938: Fixed functions `urllib.parse.urlsplit` and `urlparse`
    accepting domain names including square brackets (bsc#1236705)
  * gh-121284: Fixed bug in the folding of rfc2047 encoded-words when flattening
    an email message using a modern email policy. Previously when an encoded-
    word was too long for a line, it would be decoded, split across lines, and
    re-encoded. But commas and other special characters in the original text
    could be left unencoded and unquoted. This could theoretically be used to
    spoof header lines using a carefully constructed encoded-word if the
    resulting rendered email was transmitted or re-parsed.
  * gh-80222: Fixed bug in the folding of quoted strings when flattening an
    email message using a modern email policy. Previously when a quoted string
    was folded so that it spanned more than one line, the surrounding quotes and
    internal escapes would be omitted. This could theoretically be used to spoof
    header lines using a carefully constructed quoted string if the resulting
    rendered email was transmitted or re-parsed.
  * gh-119511: Fixed a potential denial of service in the imaplib module. When
    connecting to a malicious server, it could cause an arbitrary amount of
    memory to be allocated. On many systems this is harmless as unused virtual
    memory is only a mapping, but if this hit a virtual address size limit it
    could lead to a MemoryError or other process crash. On unusual systems or
    builds where all allocated memory is touched and backed by actual ram or
    storage it could’ve consumed resources doing so until similarly crashing.
  * gh-127257: In ssl, system call failures that OpenSSL reports using
    ERR_LIB_SYS are now raised as OSError.
  * gh-121277: Writers of CPython’s documentation can now use next as the
    version for the versionchanged, versionadded, deprecated directives.
  * gh-106883: Disabled GC during the _PyThread_CurrentFrames() and
    _PyThread_CurrentExceptions() calls to avoid the interpreter to deadlock.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Micro 6.0  
    zypper in -t patch SUSE-SLE-Micro-6.0-336=1

## Package List:

  * SUSE Linux Micro 6.0 (aarch64 s390x x86_64)
    * python311-3.11.12-1.1
    * python311-curses-debuginfo-3.11.12-1.1
    * libpython3_11-1_0-3.11.12-1.1
    * python311-core-debugsource-3.11.12-1.1
    * python311-base-debuginfo-3.11.12-1.1
    * python311-debuginfo-3.11.12-1.1
    * python311-base-3.11.12-1.1
    * python311-curses-3.11.12-1.1
    * libpython3_11-1_0-debuginfo-3.11.12-1.1
    * python311-debugsource-3.11.12-1.1

## References:

  * https://www.suse.com/security/cve/CVE-2025-0938.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1236705
  * https://bugzilla.suse.com/show_bug.cgi?id=1241067

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20250529/499f7155/attachment.htm>


More information about the sle-security-updates mailing list