<div class="container">
<h1>Security update for python311</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2025:20154-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2025-03-19T11:45:10Z</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1174091">bsc#1174091</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1210638">bsc#1210638</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219559">bsc#1219559</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219666">bsc#1219666</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221854">bsc#1221854</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225660">bsc#1225660</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226447">bsc#1226447</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226448">bsc#1226448</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227378">bsc#1227378</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227999">bsc#1227999</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228165">bsc#1228165</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228780">bsc#1228780</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229596">bsc#1229596</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229704">bsc#1229704</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230227">bsc#1230227</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230906">bsc#1230906</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231795">bsc#1231795</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232241">bsc#1232241</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236705">bsc#1236705</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238450">bsc#1238450</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239210">bsc#1239210</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=831629">bsc#831629</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2019-20907.html">CVE-2019-20907</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2019-9947.html">CVE-2019-9947</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2020-15523.html">CVE-2020-15523</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2020-15801.html">CVE-2020-15801</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-25236.html">CVE-2022-25236</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-27043.html">CVE-2023-27043</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52425.html">CVE-2023-52425</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-6597.html">CVE-2023-6597</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-0397.html">CVE-2024-0397</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-0450.html">CVE-2024-0450</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-4030.html">CVE-2024-4030</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-4032.html">CVE-2024-4032</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-6232.html">CVE-2024-6232</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-6923.html">CVE-2024-6923</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-7592.html">CVE-2024-7592</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-8088.html">CVE-2024-8088</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-9287.html">CVE-2024-9287</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-0938.html">CVE-2025-0938</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-1795.html">CVE-2025-1795</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2019-20907</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2019-20907</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2019-9947</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.4</span>
<span class="cvss-vector">CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2019-9947</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2019-9947</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2020-15523</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2020-15801</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">9.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-25236</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-25236</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">9.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-25236</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">9.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-27043</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-27043</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52425</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52425</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-6597</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-0397</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-0397</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.4</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-0450</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-0450</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-4030</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-4032</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.7</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-6232</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.2</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-6232</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-6232</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-6232</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-6923</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-6923</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-7592</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.6</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-7592</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-7592</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-8088</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.9</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-8088</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-9287</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-9287</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-9287</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-9287</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-0938</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-0938</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.0</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-0938</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-1795</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.3</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-1795</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-1795</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">2.3</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">SUSE Linux Micro 6.0</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves 19 vulnerabilities and has three fixes can now be installed.</p>
<h2>Description:</h2>
<p>This update for python311 fixes the following issues:</p>
<ul>
<li>
<p>Skip PGO with %want_reproducible_builds (bsc#1239210)</p>
</li>
<li>
<p>CVE-2025-0938: Disallows square brackets ([ and ]) in domain names for parsed
URLs (bsc#1236705).</p>
</li>
<li>
<p>Configure externally_managed with a bcond (bsc#1228165).</p>
</li>
<li>
<p>Update to 3.11.11:</p>
</li>
<li>Tools/Demos<ul>
<li>gh-123418: Update GitHub CI workflows to use OpenSSL 3.0.15
and multissltests to use 3.0.15, 3.1.7, and 3.2.3.</li>
</ul>
</li>
<li>Tests<ul>
<li>gh-125041: Re-enable skipped tests for zlib on the
s390x architecture: only skip checks of the compressed
bytes, which can be different between zlib’s software
implementation and the hardware-accelerated implementation.</li>
</ul>
</li>
<li>Security<ul>
<li>gh-126623: Upgrade libexpat to 2.6.4</li>
<li>gh-122792: Changed IPv4-mapped ipaddress.IPv6Address to
consistently use the mapped IPv4 address value for deciding
properties. Properties which have their behavior fixed are
is_multicast, is_reserved, is_link_local, is_global, and
is_unspecified.</li>
</ul>
</li>
<li>
<p>Library</p>
<ul>
<li>gh-124651: Properly quote template strings in venv
activation scripts (bsc#1232241, CVE-2024-9287).</li>
</ul>
</li>
<li>
<p>Remove -IVendor/ from python-config (bsc#1231795)</p>
</li>
<li>
<p>CVE-2024-9287: Properly quote path names provided when creating a
virtual environment (bsc#1232241)</p>
</li>
<li>
<p>Drop .pyc files from docdir for reproducible builds
(bsc#1230906).</p>
</li>
<li>
<p>Update to 3.11.10:</p>
</li>
<li>Security<ul>
<li>gh-123678: Upgrade libexpat to 2.6.3</li>
<li>gh-121957: Fixed missing audit events around interactive
use of Python, now also properly firing for <code>python -i</code>,
as well as for <code>python -m asyncio</code>. The event in question
is <code>cpython.run_stdin</code>.</li>
<li>gh-122133: Authenticate the socket connection for the
<code>socket.socketpair()</code> fallback on platforms where
<code>AF_UNIX</code> is not available like Windows. Patch by
Gregory P. Smith <greg@krypto.org> and Seth Larson
<seth@python.org>. Reported by Ellie <el@horse64.org></li>
<li>gh-121285: Remove backtracking from tarfile header parsing
for <code>hdrcharset</code>, PAX, and GNU sparse headers
(bsc#1230227, CVE-2024-6232).</li>
<li>gh-118486: :func:<code>os.mkdir</code> on Windows now accepts
<em>mode</em> of <code>0o700</code> to restrict the new directory to
the current user. This fixes CVE-2024-4030 affecting
:func:<code>tempfile.mkdtemp</code> in scenarios where the base
temporary directory is more permissive than the default.</li>
<li>gh-116741: Update bundled libexpat to 2.6.2</li>
</ul>
</li>
<li>Library<ul>
<li>gh-123270: Applied a more surgical fix for malformed
payloads in :class:<code>zipfile.Path</code> causing infinite loops
(gh-122905) without breaking contents using legitimate
characters (bsc#1229704, CVE-2024-8088).</li>
<li>gh-123067: Fix quadratic complexity in parsing <code>"</code>-quoted
cookie values with backslashes by :mod:<code>http.cookies</code>
(bsc#1229596, CVE-2024-7592).</li>
<li>gh-122905: :class:<code>zipfile.Path</code> objects now sanitize names
from the zipfile.</li>
<li>gh-121650: :mod:<code>email</code> headers with embedded newlines are
now quoted on output. The :mod:<code>~email.generator</code> will now
refuse to serialize (write) headers that are unsafely folded
or delimited; see :attr:<code>~email.policy.Policy.verify_generated_headers</code>.
(Contributed by Bas Bloemsaat and Petr Viktorin in
:gh:<code>121650</code>; CVE-2024-6923, bsc#1228780).</li>
<li>gh-119506: Fix :meth:<code>!io.TextIOWrapper.write</code> method
breaks internal buffer when the method is called again
during flushing internal buffer.</li>
<li>gh-118643: Fix an AttributeError in the :mod:<code>email</code> module
when re-fold a long address list. Also fix more cases of
incorrect encoding of the address separator in the address
list.</li>
<li>gh-113171: Fixed various false positives and false
negatives in * :attr:<code>ipaddress.IPv4Address.is_private</code>
(see these docs for details) *
:attr:<code>ipaddress.IPv4Address.is_global</code> *
:attr:<code>ipaddress.IPv6Address.is_private</code> *
:attr:<code>ipaddress.IPv6Address.is_global</code> Also in the
corresponding :class:<code>ipaddress.IPv4Network</code> and
:class:<code>ipaddress.IPv6Network</code> attributes.
Fixes bsc#1226448 (CVE-2024-4032).</li>
<li>gh-102988: :func:<code>email.utils.getaddresses</code> and
:func:<code>email.utils.parseaddr</code> now return <code>('', '')</code>
2-tuples in more situations where invalid email addresses
are encountered instead of potentially inaccurate
values. Add optional <em>strict</em> parameter to these two
functions: use <code>strict=False</code> to get the old behavior,
accept malformed inputs. <code>getattr(email.utils,
'supports_strict_parsing', False)</code> can be use to check if
the <em>strict</em> paramater is available. Patch by Thomas Dwyer
and Victor Stinner to improve the CVE-2023-27043 fix
(bsc#1210638).</li>
<li>gh-67693: Fix :func:<code>urllib.parse.urlunparse</code> and
:func:<code>urllib.parse.urlunsplit</code> for URIs with path starting
with multiple slashes and no authority. Based on patch by
Ashwin Ramaswami.</li>
</ul>
</li>
<li>
<p>Core and Builtins</p>
<ul>
<li>gh-112275: A deadlock involving <code>pystate.c</code>'s
<code>HEAD_LOCK</code> in <code>posixmodule.c</code> at fork is now
fixed. Patch by ChuBoning based on previous Python 3.12 fix
by Victor Stinner.</li>
<li>gh-109120: Added handle of incorrect star expressions, e.g
<code>f(3, *)</code>. Patch by Grigoryev Semyon</li>
</ul>
</li>
<li>
<p>CVE-2024-8088: Prevent malformed payload to cause infinite loops in
zipfile.Path (bsc#1229704).</p>
</li>
<li>
<p>Make pip and modern tools install directly in /usr/local when used by the user.
(bsc#1225660).</p>
</li>
<li>
<p>CVE-2024-4032: Fix rearranging definition of private v global IP addresses (bsc#1226448).</p>
</li>
<li>
<p>Update to 3.11.9:</p>
</li>
<li>Security<ul>
<li>gh-115398: Allow controlling Expat >=2.6.0 reparse deferral
(CVE-2023-52425, bsc#1219559) by adding five new methods:
xml.etree.ElementTree.XMLParser.flush()
xml.etree.ElementTree.XMLPullParser.flush()
xml.parsers.expat.xmlparser.GetReparseDeferralEnabled()
xml.parsers.expat.xmlparser.SetReparseDeferralEnabled()
xml.sax.expatreader.ExpatParser.flush()</li>
<li>gh-115399: Update bundled libexpat to 2.6.0</li>
<li>gh-115243: Fix possible crashes in collections.deque.index()
when the deque is concurrently modified.</li>
<li>gh-114572: ssl.SSLContext.cert_store_stats() and
ssl.SSLContext.get_ca_certs() now correctly lock access to the
certificate store, when the ssl.SSLContext is shared across
multiple threads (bsc#1226447, CVE-2024-0397).</li>
</ul>
</li>
<li>Core and Builtins<ul>
<li>gh-116296: Fix possible refleak in object.<strong>reduce</strong>() internal
error handling.</li>
<li>gh-116034: Fix location of the error on a failed assertion.</li>
<li>gh-115823: Properly calculate error ranges in the parser when
raising SyntaxError exceptions caused by invalid byte sequences.
Patch by Pablo Galindo</li>
<li>gh-112087: For an empty reverse iterator for list will be
reduced to reversed(). Patch by Donghee Na.</li>
<li>gh-115011: Setters for members with an unsigned integer type now
support the same range of valid values for objects that has a
<strong>index</strong>() method as for int.</li>
<li>gh-96497: Fix incorrect resolution of mangled class variables
used in assignment expressions in comprehensions.</li>
</ul>
</li>
<li>Library<ul>
<li>gh-117310: Fixed an unlikely early & extra Py_DECREF triggered
crash in ssl when creating a new _ssl._SSLContext if CPython was
built implausibly such that the default cipher list is empty or
the SSL library it was linked against reports a failure from its
C SSL_CTX_set_cipher_list() API.</li>
<li>gh-117178: Fix regression in lazy loading of self-referential
modules, introduced in gh-114781.</li>
<li>gh-117084: Fix zipfile extraction for directory entries with the
name containing backslashes on Windows.</li>
<li>gh-117110: Fix a bug that prevents subclasses of typing.Any to
be instantiated with arguments. Patch by Chris Fu.</li>
<li>gh-90872: On Windows, subprocess.Popen.wait() no longer calls
WaitForSingleObject() with a negative timeout: pass 0 ms if the
timeout is negative. Patch by Victor Stinner.</li>
<li>gh-116957: configparser: Don’t leave ConfigParser values in an
invalid state (stored as a list instead of a str) after an
earlier read raised DuplicateSectionError or
DuplicateOptionError.</li>
<li>gh-90095: Ignore empty lines and comments in .pdbrc</li>
<li>gh-116764: Restore support of None and other false values in
urllib.parse functions parse_qs() and parse_qsl(). Also, they
now raise a TypeError for non-zero integers and non-empty
sequences.</li>
<li>gh-116811: In PathFinder.invalidate_caches, delegate to
MetadataPathFinder.invalidate_caches.</li>
<li>gh-116600: Fix repr() for global Flag members.</li>
<li>gh-116484: Change automatically generated tkinter.Checkbutton
widget names to avoid collisions with automatically generated
tkinter.ttk.Checkbutton widget names within the same parent
widget.</li>
<li>gh-116401: Fix blocking os.fwalk() and shutil.rmtree() on
opening named pipe.</li>
<li>gh-116143: Fix a race in pydoc _start_server, eliminating a
window in which _start_server can return a thread that is
“serving” but without a docserver set.</li>
<li>gh-116325: typing: raise SyntaxError instead of AttributeError
on forward references as empty strings.</li>
<li>gh-90535: Fix support of interval values > 1 in
logging.TimedRotatingFileHandler for when='MIDNIGHT' and
when='Wx'.</li>
<li>gh-115978: Disable preadv(), readv(), pwritev(), and writev() on
WASI.</li>
<li>Under wasmtime for WASI 0.2, these functions don’t pass
test_posix
(https://github.com/bytecodealliance/wasmtime/issues/7830).</li>
<li>gh-88352: Fix the computation of the next rollover time in the
logging.TimedRotatingFileHandler handler. computeRollover() now
always returns a timestamp larger than the specified time and
works correctly during the DST change. doRollover() no longer
overwrite the already rolled over file, saving from data loss
when run at midnight or during repeated time at the DST change.</li>
<li>gh-87115: Set <strong>main</strong>.<strong>spec</strong> to None when running a script
with pdb</li>
<li>gh-76511: Fix UnicodeEncodeError in email.Message.as_string()
that results when a message that claims to be in the ascii
character set actually has non-ascii characters. Non-ascii
characters are now replaced with the U+FFFD replacement
character, like in the replace error handler.</li>
<li>gh-75988: Fixed unittest.mock.create_autospec() to pass the call
through to the wrapped object to return the real result.</li>
<li>gh-115881: Fix issue where ast.parse() would incorrectly flag
conditional context managers (such as with (x() if y else z()):
...) as invalid syntax if feature_version=(3, 8) was passed.
This reverts changes to the grammar made as part of gh-94949.</li>
<li>gh-115886: Fix silent truncation of the name with an embedded
null character in multiprocessing.shared_memory.SharedMemory.</li>
<li>gh-115809: Improve algorithm for computing which rolled-over log
files to delete in logging.TimedRotatingFileHandler. It is now
reliable for handlers without namer and with arbitrary
deterministic namer that leaves the datetime part in the file
name unmodified.</li>
<li>gh-74668: urllib.parse functions parse_qs() and parse_qsl() now
support bytes arguments containing raw and percent-encoded
non-ASCII data.</li>
<li>gh-67044: csv.writer() now always quotes or escapes '\r' and
'\n', regardless of lineterminator value.</li>
<li>gh-115712: csv.writer() now quotes empty fields if delimiter is
a space and skipinitialspace is true and raises exception if
quoting is not possible.</li>
<li>gh-115618: Fix improper decreasing the reference count for None
argument in property methods getter(), setter() and deleter().</li>
<li>gh-115570: A DeprecationWarning is no longer omitted on access
to the <strong>doc</strong> attributes of the deprecated typing.io and
typing.re pseudo-modules.</li>
<li>gh-112006: Fix inspect.unwrap() for types with the <strong>wrapper</strong>
data descriptor.</li>
<li>gh-101293: Support callables with the <strong>call</strong>() method and
types with <strong>new</strong>() and <strong>init</strong>() methods set to class
methods, static methods, bound methods, partial functions, and
other types of methods and descriptors in
inspect.Signature.from_callable().</li>
<li>gh-115392: Fix a bug in doctest where incorrect line numbers
would be reported for decorated functions.</li>
<li>gh-114563: Fix several format() bugs when using the C
implementation of Decimal: * memory leak in some rare cases when
using the z format option (coerce negative 0) * incorrect output
when applying the z format option to type F (fixed-point with
capital NAN / INF) * incorrect output when applying the # format
option (alternate form)</li>
<li>gh-115197: urllib.request no longer resolves the hostname before
checking it against the system’s proxy bypass list on macOS and
Windows.</li>
<li>gh-115198: Fix support of Docutils >= 0.19 in distutils.</li>
<li>gh-115165: Most exceptions are now ignored when attempting to
set the <strong>orig_class</strong> attribute on objects returned when
calling typing generic aliases (including generic aliases
created using typing.Annotated). Previously only AttributeError
was ignored. Patch by Dave Shawley.</li>
<li>gh-115133: Fix tests for XMLPullParser with Expat 2.6.0.</li>
<li>gh-115059: io.BufferedRandom.read1() now flushes the underlying
write buffer.</li>
<li>gh-79382: Trailing ** no longer allows to match files and
non-existing paths in recursive glob().</li>
<li>gh-114763: Protect modules loaded with importlib.util.LazyLoader
from race conditions when multiple threads try to access
attributes before the loading is complete.</li>
<li>gh-97959: Fix rendering class methods, bound methods, method and
function aliases in pydoc. Class methods no longer have “method
of builtins.type instance” note. Corresponding notes are now
added for class and unbound methods. Method and function aliases
now have references to the module or the class where the origin
was defined if it differs from the current. Bound methods are
now listed in the static methods section. Methods of builtin
classes are now supported as well as methods of Python classes.</li>
<li>gh-112281: Allow creating union of types for typing.Annotated
with unhashable metadata.</li>
<li>gh-111775: Fix importlib.resources.simple.ResourceHandle.open()
for text mode, added missed stream argument.</li>
<li>gh-90095: Make .pdbrc and -c work with any valid pdb commands.</li>
<li>gh-107155: Fix incorrect output of help(x) where x is a lambda
function, which has an <strong>annotations</strong> dictionary attribute with
a "return" key.</li>
<li>gh-105866: Fixed _get_slots bug which caused error when defining
dataclasses with slots and a weakref_slot.</li>
<li>gh-60346: Fix ArgumentParser inconsistent with parse_known_args.</li>
<li>gh-100985: Update HTTPSConnection to consistently wrap IPv6
Addresses when using a proxy.</li>
<li>gh-100884: email: fix misfolding of comma in address-lists
over multiple lines in combination with unicode encoding
(bsc#1238450 CVE-2025-1795)</li>
<li>gh-95782: Fix io.BufferedReader.tell(),
io.BufferedReader.seek(), _pyio.BufferedReader.tell(),
io.BufferedRandom.tell(), io.BufferedRandom.seek() and
_pyio.BufferedRandom.tell() being able to return negative
offsets.</li>
<li>gh-96310: Fix a traceback in argparse when all options in a
mutually exclusive group are suppressed.</li>
<li>gh-93205: Fixed a bug in
logging.handlers.TimedRotatingFileHandler where multiple
rotating handler instances pointing to files with the same name
but different extensions would conflict and not delete the
correct files.</li>
<li>bpo-44865: Add missing call to localization function in
argparse.</li>
<li>bpo-43952: Fix multiprocessing.connection.Listener.accept() to
accept empty bytes as authkey. Not accepting empty bytes as key
causes it to hang indefinitely.</li>
<li>bpo-42125: linecache: get module name from <strong>spec</strong> if
available. This allows getting source code for the <strong>main</strong>
module when a custom loader is used.</li>
<li>gh-66543: Make mimetypes.guess_type() properly parsing of URLs
with only a host name, URLs containing fragment or query, and
filenames with only a UNC sharepoint on Windows. Based on patch
by Dong-hee Na.</li>
<li>bpo-33775: Add ‘default’ and ‘version’ help text for
localization in argparse.</li>
</ul>
</li>
<li>Documentation<ul>
<li>gh-115399: Document CVE-2023-52425 of Expat <2.6.0 under “XML
vulnerabilities”.</li>
<li>gh-115233: Fix an example for LoggerAdapter in the Logging
Cookbook.</li>
</ul>
</li>
<li>Tests<ul>
<li>gh-83434: Disable JUnit XML output (--junit-xml=FILE command
line option) in regrtest when hunting for reference leaks (-R
option). Patch by Victor Stinner.</li>
<li>gh-117187: Fix XML tests for vanilla Expat <2.6.0.</li>
<li>gh-115979: Update test_importlib so that it passes under WASI
SDK 21.</li>
<li>gh-116307: Added import helper isolated_modules as CleanImport
does not remove modules imported during the context.</li>
<li>gh-115720: Leak tests (-R, --huntrleaks) now show a summary of
the number of leaks found in each iteration.</li>
<li>gh-115122: Add --bisect option to regrtest test runner: run
failed tests with test.bisect_cmd to identify failing tests.
Patch by Victor Stinner.</li>
<li>gh-115596: Fix ProgramPriorityTests in test_os permanently
changing the process priority.</li>
<li>gh-115198: Fix test_check_metadata_deprecate in distutils tests
with a newer Docutils.</li>
</ul>
</li>
<li>Build<ul>
<li>gh-116313: Get WASI builds to work under wasmtime 18 w/ WASI
0.2/preview2 primitives.</li>
<li>gh-115167: Avoid vendoring vcruntime140_threads.dll when
building with Visual Studio 2022 version 17.8.</li>
</ul>
</li>
<li>Windows<ul>
<li>gh-116773: Fix instances of <_overlapped.Overlapped object at
0xXXX> still has pending operation at deallocation, the process
may crash.</li>
<li>gh-91227: Fix the asyncio ProactorEventLoop implementation so
that sending a datagram to an address that is not listening does
not prevent receiving any more datagrams.</li>
<li>gh-115554: The installer now has more strict rules about
updating the Python Launcher for Windows. In general, most users
only have a single launcher installed and will see no
difference. When multiple launchers have been installed, the
option to install the launcher is disabled until all but one
have been removed. Downgrading the launcher (which was never
allowed) is now more obviously blocked.</li>
<li>gh-115543: Python Launcher for Windows can now detect Python
3.13 when installed from the Microsoft Store, and will install
Python 3.12 by default when PYLAUNCHER_ALLOW_INSTALL is set.</li>
<li>gh-115009: Update Windows installer to use SQLite 3.45.1.</li>
</ul>
</li>
<li>IDLE<ul>
<li>gh-88516: On macOS show a proxy icon in the title bar of editor
windows to match platform behaviour.</li>
</ul>
</li>
<li>Tools/Demos<ul>
<li>gh-113516: Don’t set LDSHARED when building for WASI.</li>
</ul>
</li>
<li>
<p>C API</p>
<ul>
<li>gh-117021: Fix integer overflow in PyLong_AsPid() on non-Windows
64-bit platforms.</li>
</ul>
</li>
<li>
<p>Add reference to CVE-2024-0450 (bsc#1221854) to changelog.</p>
</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
SUSE Linux Micro 6.0
<br/>
<code>zypper in -t patch SUSE-SLE-Micro-6.0-253=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
SUSE Linux Micro 6.0 (aarch64 s390x x86_64)
<ul>
<li>python311-curses-3.11.11-1.1</li>
<li>python311-base-3.11.11-1.1</li>
<li>python311-curses-debuginfo-3.11.11-1.1</li>
<li>libpython3_11-1_0-3.11.11-1.1</li>
<li>python311-core-debugsource-3.11.11-1.1</li>
<li>python311-base-debuginfo-3.11.11-1.1</li>
<li>libpython3_11-1_0-debuginfo-3.11.11-1.1</li>
<li>python311-3.11.11-1.1</li>
<li>python311-debuginfo-3.11.11-1.1</li>
<li>python311-debugsource-3.11.11-1.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2019-20907.html">https://www.suse.com/security/cve/CVE-2019-20907.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2019-9947.html">https://www.suse.com/security/cve/CVE-2019-9947.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2020-15523.html">https://www.suse.com/security/cve/CVE-2020-15523.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2020-15801.html">https://www.suse.com/security/cve/CVE-2020-15801.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-25236.html">https://www.suse.com/security/cve/CVE-2022-25236.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-27043.html">https://www.suse.com/security/cve/CVE-2023-27043.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52425.html">https://www.suse.com/security/cve/CVE-2023-52425.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-6597.html">https://www.suse.com/security/cve/CVE-2023-6597.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-0397.html">https://www.suse.com/security/cve/CVE-2024-0397.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-0450.html">https://www.suse.com/security/cve/CVE-2024-0450.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-4030.html">https://www.suse.com/security/cve/CVE-2024-4030.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-4032.html">https://www.suse.com/security/cve/CVE-2024-4032.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-6232.html">https://www.suse.com/security/cve/CVE-2024-6232.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-6923.html">https://www.suse.com/security/cve/CVE-2024-6923.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-7592.html">https://www.suse.com/security/cve/CVE-2024-7592.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-8088.html">https://www.suse.com/security/cve/CVE-2024-8088.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-9287.html">https://www.suse.com/security/cve/CVE-2024-9287.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-0938.html">https://www.suse.com/security/cve/CVE-2025-0938.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-1795.html">https://www.suse.com/security/cve/CVE-2025-1795.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1174091">https://bugzilla.suse.com/show_bug.cgi?id=1174091</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1210638">https://bugzilla.suse.com/show_bug.cgi?id=1210638</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219559">https://bugzilla.suse.com/show_bug.cgi?id=1219559</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219666">https://bugzilla.suse.com/show_bug.cgi?id=1219666</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221854">https://bugzilla.suse.com/show_bug.cgi?id=1221854</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225660">https://bugzilla.suse.com/show_bug.cgi?id=1225660</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226447">https://bugzilla.suse.com/show_bug.cgi?id=1226447</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226448">https://bugzilla.suse.com/show_bug.cgi?id=1226448</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227378">https://bugzilla.suse.com/show_bug.cgi?id=1227378</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227999">https://bugzilla.suse.com/show_bug.cgi?id=1227999</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228165">https://bugzilla.suse.com/show_bug.cgi?id=1228165</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228780">https://bugzilla.suse.com/show_bug.cgi?id=1228780</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229596">https://bugzilla.suse.com/show_bug.cgi?id=1229596</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229704">https://bugzilla.suse.com/show_bug.cgi?id=1229704</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230227">https://bugzilla.suse.com/show_bug.cgi?id=1230227</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230906">https://bugzilla.suse.com/show_bug.cgi?id=1230906</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231795">https://bugzilla.suse.com/show_bug.cgi?id=1231795</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232241">https://bugzilla.suse.com/show_bug.cgi?id=1232241</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236705">https://bugzilla.suse.com/show_bug.cgi?id=1236705</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238450">https://bugzilla.suse.com/show_bug.cgi?id=1238450</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239210">https://bugzilla.suse.com/show_bug.cgi?id=1239210</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=831629">https://bugzilla.suse.com/show_bug.cgi?id=831629</a>
</li>
</ul>
</div>