<div class="container">
    <h1>Security update for python311</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2025:20154-1</td>
        </tr>
        <tr>
            <th>Release Date:</th>
            <td>2025-03-19T11:45:10Z</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1174091">bsc#1174091</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210638">bsc#1210638</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219559">bsc#1219559</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219666">bsc#1219666</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221854">bsc#1221854</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225660">bsc#1225660</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226447">bsc#1226447</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226448">bsc#1226448</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227378">bsc#1227378</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227999">bsc#1227999</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228165">bsc#1228165</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228780">bsc#1228780</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229596">bsc#1229596</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229704">bsc#1229704</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230227">bsc#1230227</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230906">bsc#1230906</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231795">bsc#1231795</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232241">bsc#1232241</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236705">bsc#1236705</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238450">bsc#1238450</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1239210">bsc#1239210</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=831629">bsc#831629</a>
                        </li>
                    
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2019-20907.html">CVE-2019-20907</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2019-9947.html">CVE-2019-9947</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2020-15523.html">CVE-2020-15523</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2020-15801.html">CVE-2020-15801</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-25236.html">CVE-2022-25236</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-27043.html">CVE-2023-27043</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-52425.html">CVE-2023-52425</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-6597.html">CVE-2023-6597</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-0397.html">CVE-2024-0397</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-0450.html">CVE-2024-0450</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-4030.html">CVE-2024-4030</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-4032.html">CVE-2024-4032</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-6232.html">CVE-2024-6232</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-6923.html">CVE-2024-6923</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-7592.html">CVE-2024-7592</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-8088.html">CVE-2024-8088</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-9287.html">CVE-2024-9287</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-0938.html">CVE-2025-0938</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-1795.html">CVE-2025-1795</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2019-20907</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2019-20907</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2019-9947</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.4</span>
                                <span class="cvss-vector">CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2019-9947</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2019-9947</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.1</span>
                                <span class="cvss-vector">CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2020-15523</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2020-15801</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-25236</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-25236</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-25236</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-27043</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-27043</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52425</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-52425</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-6597</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-0397</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-0397</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-0450</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-0450</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-4030</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-4032</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-6232</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.2</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-6232</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-6232</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-6232</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-6923</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-6923</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-7592</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">2.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-7592</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-7592</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-8088</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.9</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-8088</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9287</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9287</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9287</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-9287</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-0938</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.3</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-0938</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-0938</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.3</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-1795</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">2.3</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-1795</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-1795</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">2.3</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">SUSE Linux Micro 6.0</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves 19 vulnerabilities and has three fixes can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update for python311 fixes the following issues:</p>
<ul>
<li>
<p>Skip PGO with %want_reproducible_builds (bsc#1239210)</p>
</li>
<li>
<p>CVE-2025-0938: Disallows square brackets ([ and ]) in domain names for parsed
  URLs (bsc#1236705).</p>
</li>
<li>
<p>Configure externally_managed with a bcond (bsc#1228165).</p>
</li>
<li>
<p>Update to 3.11.11:</p>
</li>
<li>Tools/Demos<ul>
<li>gh-123418: Update GitHub CI workflows to use OpenSSL 3.0.15
  and multissltests to use 3.0.15, 3.1.7, and 3.2.3.</li>
</ul>
</li>
<li>Tests<ul>
<li>gh-125041: Re-enable skipped tests for zlib on the
  s390x architecture: only skip checks of the compressed
  bytes, which can be different between zlib’s software
  implementation and the hardware-accelerated implementation.</li>
</ul>
</li>
<li>Security<ul>
<li>gh-126623: Upgrade libexpat to 2.6.4</li>
<li>gh-122792: Changed IPv4-mapped ipaddress.IPv6Address to
  consistently use the mapped IPv4 address value for deciding
  properties. Properties which have their behavior fixed are
  is_multicast, is_reserved, is_link_local, is_global, and
  is_unspecified.</li>
</ul>
</li>
<li>
<p>Library</p>
<ul>
<li>gh-124651: Properly quote template strings in venv
  activation scripts (bsc#1232241, CVE-2024-9287).</li>
</ul>
</li>
<li>
<p>Remove -IVendor/ from python-config (bsc#1231795)</p>
</li>
<li>
<p>CVE-2024-9287: Properly quote path names provided when creating a
  virtual environment (bsc#1232241)</p>
</li>
<li>
<p>Drop .pyc files from docdir for reproducible builds
  (bsc#1230906).</p>
</li>
<li>
<p>Update to 3.11.10:</p>
</li>
<li>Security<ul>
<li>gh-123678: Upgrade libexpat to 2.6.3</li>
<li>gh-121957: Fixed missing audit events around interactive
  use of Python, now also properly firing for <code>python -i</code>,
  as well as for <code>python -m asyncio</code>. The event in question
  is <code>cpython.run_stdin</code>.</li>
<li>gh-122133: Authenticate the socket connection for the
  <code>socket.socketpair()</code> fallback on platforms where
  <code>AF_UNIX</code> is not available like Windows. Patch by
  Gregory P. Smith <greg@krypto.org> and Seth Larson
  <seth@python.org>. Reported by Ellie <el@horse64.org></li>
<li>gh-121285: Remove backtracking from tarfile header parsing
  for <code>hdrcharset</code>, PAX, and GNU sparse headers
  (bsc#1230227, CVE-2024-6232).</li>
<li>gh-118486: :func:<code>os.mkdir</code> on Windows now accepts
  <em>mode</em> of <code>0o700</code> to restrict the new directory to
  the current user. This fixes CVE-2024-4030 affecting
  :func:<code>tempfile.mkdtemp</code> in scenarios where the base
  temporary directory is more permissive than the default.</li>
<li>gh-116741: Update bundled libexpat to 2.6.2</li>
</ul>
</li>
<li>Library<ul>
<li>gh-123270: Applied a more surgical fix for malformed
  payloads in :class:<code>zipfile.Path</code> causing infinite loops
  (gh-122905) without breaking contents using legitimate
  characters (bsc#1229704, CVE-2024-8088).</li>
<li>gh-123067: Fix quadratic complexity in parsing <code>&quot;</code>-quoted
  cookie values with backslashes by :mod:<code>http.cookies</code>
  (bsc#1229596, CVE-2024-7592).</li>
<li>gh-122905: :class:<code>zipfile.Path</code> objects now sanitize names
  from the zipfile.</li>
<li>gh-121650: :mod:<code>email</code> headers with embedded newlines are
  now quoted on output. The :mod:<code>~email.generator</code> will now
  refuse to serialize (write) headers that are unsafely folded
  or delimited; see :attr:<code>~email.policy.Policy.verify_generated_headers</code>.
  (Contributed by Bas Bloemsaat and Petr Viktorin in
  :gh:<code>121650</code>; CVE-2024-6923, bsc#1228780).</li>
<li>gh-119506: Fix :meth:<code>!io.TextIOWrapper.write</code> method
  breaks internal buffer when the method is called again
  during flushing internal buffer.</li>
<li>gh-118643: Fix an AttributeError in the :mod:<code>email</code> module
  when re-fold a long address list. Also fix more cases of
  incorrect encoding of the address separator in the address
  list.</li>
<li>gh-113171: Fixed various false positives and false
  negatives in * :attr:<code>ipaddress.IPv4Address.is_private</code>
  (see these docs for details) *
  :attr:<code>ipaddress.IPv4Address.is_global</code> *
  :attr:<code>ipaddress.IPv6Address.is_private</code> *
  :attr:<code>ipaddress.IPv6Address.is_global</code> Also in the
  corresponding :class:<code>ipaddress.IPv4Network</code> and
  :class:<code>ipaddress.IPv6Network</code> attributes.
  Fixes bsc#1226448 (CVE-2024-4032).</li>
<li>gh-102988: :func:<code>email.utils.getaddresses</code> and
  :func:<code>email.utils.parseaddr</code> now return <code>(&#x27;&#x27;, &#x27;&#x27;)</code>
  2-tuples in more situations where invalid email addresses
  are encountered instead of potentially inaccurate
  values. Add optional <em>strict</em> parameter to these two
  functions: use <code>strict=False</code> to get the old behavior,
  accept malformed inputs. <code>getattr(email.utils,
  &#x27;supports_strict_parsing&#x27;, False)</code> can be use to check if
  the <em>strict</em> paramater is available. Patch by Thomas Dwyer
  and Victor Stinner to improve the CVE-2023-27043 fix
  (bsc#1210638).</li>
<li>gh-67693: Fix :func:<code>urllib.parse.urlunparse</code> and
  :func:<code>urllib.parse.urlunsplit</code> for URIs with path starting
  with multiple slashes and no authority. Based on patch by
  Ashwin Ramaswami.</li>
</ul>
</li>
<li>
<p>Core and Builtins</p>
<ul>
<li>gh-112275: A deadlock involving <code>pystate.c</code>&#x27;s
  <code>HEAD_LOCK</code> in <code>posixmodule.c</code> at fork is now
  fixed. Patch by ChuBoning based on previous Python 3.12 fix
  by Victor Stinner.</li>
<li>gh-109120: Added handle of incorrect star expressions, e.g
  <code>f(3, *)</code>. Patch by Grigoryev Semyon</li>
</ul>
</li>
<li>
<p>CVE-2024-8088: Prevent malformed payload to cause infinite loops in
  zipfile.Path (bsc#1229704).</p>
</li>
<li>
<p>Make pip and modern tools install directly in /usr/local when used by the user.
  (bsc#1225660).</p>
</li>
<li>
<p>CVE-2024-4032: Fix rearranging definition of private v global IP addresses (bsc#1226448).</p>
</li>
<li>
<p>Update to 3.11.9:</p>
</li>
<li>Security<ul>
<li>gh-115398: Allow controlling Expat >=2.6.0 reparse deferral
  (CVE-2023-52425,  bsc#1219559) by adding five new methods:
    xml.etree.ElementTree.XMLParser.flush()
    xml.etree.ElementTree.XMLPullParser.flush()
    xml.parsers.expat.xmlparser.GetReparseDeferralEnabled()
    xml.parsers.expat.xmlparser.SetReparseDeferralEnabled()
    xml.sax.expatreader.ExpatParser.flush()</li>
<li>gh-115399: Update bundled libexpat to 2.6.0</li>
<li>gh-115243: Fix possible crashes in collections.deque.index()
  when the deque is concurrently modified.</li>
<li>gh-114572: ssl.SSLContext.cert_store_stats() and
  ssl.SSLContext.get_ca_certs() now correctly lock access to the
  certificate store, when the ssl.SSLContext is shared across
  multiple threads (bsc#1226447, CVE-2024-0397).</li>
</ul>
</li>
<li>Core and Builtins<ul>
<li>gh-116296: Fix possible refleak in object.<strong>reduce</strong>() internal
  error handling.</li>
<li>gh-116034: Fix location of the error on a failed assertion.</li>
<li>gh-115823: Properly calculate error ranges in the parser when
  raising SyntaxError exceptions caused by invalid byte sequences.
  Patch by Pablo Galindo</li>
<li>gh-112087: For an empty reverse iterator for list will be
  reduced to reversed(). Patch by Donghee Na.</li>
<li>gh-115011: Setters for members with an unsigned integer type now
  support the same range of valid values for objects that has a
  <strong>index</strong>() method as for int.</li>
<li>gh-96497: Fix incorrect resolution of mangled class variables
  used in assignment expressions in comprehensions.</li>
</ul>
</li>
<li>Library<ul>
<li>gh-117310: Fixed an unlikely early & extra Py_DECREF triggered
  crash in ssl when creating a new _ssl._SSLContext if CPython was
  built implausibly such that the default cipher list is empty or
  the SSL library it was linked against reports a failure from its
  C SSL_CTX_set_cipher_list() API.</li>
<li>gh-117178: Fix regression in lazy loading of self-referential
  modules, introduced in gh-114781.</li>
<li>gh-117084: Fix zipfile extraction for directory entries with the
  name containing backslashes on Windows.</li>
<li>gh-117110: Fix a bug that prevents subclasses of typing.Any to
  be instantiated with arguments. Patch by Chris Fu.</li>
<li>gh-90872: On Windows, subprocess.Popen.wait() no longer calls
  WaitForSingleObject() with a negative timeout: pass 0 ms if the
  timeout is negative. Patch by Victor Stinner.</li>
<li>gh-116957: configparser: Don’t leave ConfigParser values in an
  invalid state (stored as a list instead of a str) after an
  earlier read raised DuplicateSectionError or
  DuplicateOptionError.</li>
<li>gh-90095: Ignore empty lines and comments in .pdbrc</li>
<li>gh-116764: Restore support of None and other false values in
  urllib.parse functions parse_qs() and parse_qsl(). Also, they
  now raise a TypeError for non-zero integers and non-empty
  sequences.</li>
<li>gh-116811: In PathFinder.invalidate_caches, delegate to
  MetadataPathFinder.invalidate_caches.</li>
<li>gh-116600: Fix repr() for global Flag members.</li>
<li>gh-116484: Change automatically generated tkinter.Checkbutton
  widget names to avoid collisions with automatically generated
  tkinter.ttk.Checkbutton widget names within the same parent
  widget.</li>
<li>gh-116401: Fix blocking os.fwalk() and shutil.rmtree() on
  opening named pipe.</li>
<li>gh-116143: Fix a race in pydoc _start_server, eliminating a
  window in which _start_server can return a thread that is
  “serving” but without a docserver set.</li>
<li>gh-116325: typing: raise SyntaxError instead of AttributeError
  on forward references as empty strings.</li>
<li>gh-90535: Fix support of interval values > 1 in
  logging.TimedRotatingFileHandler for when=&#x27;MIDNIGHT&#x27; and
  when=&#x27;Wx&#x27;.</li>
<li>gh-115978: Disable preadv(), readv(), pwritev(), and writev() on
  WASI.</li>
<li>Under wasmtime for WASI 0.2, these functions don’t pass
  test_posix
  (https://github.com/bytecodealliance/wasmtime/issues/7830).</li>
<li>gh-88352: Fix the computation of the next rollover time in the
  logging.TimedRotatingFileHandler handler. computeRollover() now
  always returns a timestamp larger than the specified time and
  works correctly during the DST change. doRollover() no longer
  overwrite the already rolled over file, saving from data loss
  when run at midnight or during repeated time at the DST change.</li>
<li>gh-87115: Set <strong>main</strong>.<strong>spec</strong> to None when running a script
  with pdb</li>
<li>gh-76511: Fix UnicodeEncodeError in email.Message.as_string()
  that results when a message that claims to be in the ascii
  character set actually has non-ascii characters. Non-ascii
  characters are now replaced with the U+FFFD replacement
  character, like in the replace error handler.</li>
<li>gh-75988: Fixed unittest.mock.create_autospec() to pass the call
  through to the wrapped object to return the real result.</li>
<li>gh-115881: Fix issue where ast.parse() would incorrectly flag
  conditional context managers (such as with (x() if y else z()):
  ...) as invalid syntax if feature_version=(3, 8) was passed.
  This reverts changes to the grammar made as part of gh-94949.</li>
<li>gh-115886: Fix silent truncation of the name with an embedded
  null character in multiprocessing.shared_memory.SharedMemory.</li>
<li>gh-115809: Improve algorithm for computing which rolled-over log
  files to delete in logging.TimedRotatingFileHandler. It is now
  reliable for handlers without namer and with arbitrary
  deterministic namer that leaves the datetime part in the file
  name unmodified.</li>
<li>gh-74668: urllib.parse functions parse_qs() and parse_qsl() now
  support bytes arguments containing raw and percent-encoded
  non-ASCII data.</li>
<li>gh-67044: csv.writer() now always quotes or escapes &#x27;\r&#x27; and
  &#x27;\n&#x27;, regardless of lineterminator value.</li>
<li>gh-115712: csv.writer() now quotes empty fields if delimiter is
  a space and skipinitialspace is true and raises exception if
  quoting is not possible.</li>
<li>gh-115618: Fix improper decreasing the reference count for None
  argument in property methods getter(), setter() and deleter().</li>
<li>gh-115570: A DeprecationWarning is no longer omitted on access
  to the <strong>doc</strong> attributes of the deprecated typing.io and
  typing.re pseudo-modules.</li>
<li>gh-112006: Fix inspect.unwrap() for types with the <strong>wrapper</strong>
  data descriptor.</li>
<li>gh-101293: Support callables with the <strong>call</strong>() method and
  types with <strong>new</strong>() and <strong>init</strong>() methods set to class
  methods, static methods, bound methods, partial functions, and
  other types of methods and descriptors in
  inspect.Signature.from_callable().</li>
<li>gh-115392: Fix a bug in doctest where incorrect line numbers
  would be reported for decorated functions.</li>
<li>gh-114563: Fix several format() bugs when using the C
  implementation of Decimal: * memory leak in some rare cases when
  using the z format option (coerce negative 0) * incorrect output
  when applying the z format option to type F (fixed-point with
  capital NAN / INF) * incorrect output when applying the # format
  option (alternate form)</li>
<li>gh-115197: urllib.request no longer resolves the hostname before
  checking it against the system’s proxy bypass list on macOS and
  Windows.</li>
<li>gh-115198: Fix support of Docutils >= 0.19 in distutils.</li>
<li>gh-115165: Most exceptions are now ignored when attempting to
  set the <strong>orig_class</strong> attribute on objects returned when
  calling typing generic aliases (including generic aliases
  created using typing.Annotated). Previously only AttributeError
  was ignored. Patch by Dave Shawley.</li>
<li>gh-115133: Fix tests for XMLPullParser with Expat 2.6.0.</li>
<li>gh-115059: io.BufferedRandom.read1() now flushes the underlying
  write buffer.</li>
<li>gh-79382: Trailing ** no longer allows to match files and
  non-existing paths in recursive glob().</li>
<li>gh-114763: Protect modules loaded with importlib.util.LazyLoader
  from race conditions when multiple threads try to access
  attributes before the loading is complete.</li>
<li>gh-97959: Fix rendering class methods, bound methods, method and
  function aliases in pydoc. Class methods no longer have “method
  of builtins.type instance” note. Corresponding notes are now
  added for class and unbound methods. Method and function aliases
  now have references to the module or the class where the origin
  was defined if it differs from the current. Bound methods are
  now listed in the static methods section. Methods of builtin
  classes are now supported as well as methods of Python classes.</li>
<li>gh-112281: Allow creating union of types for typing.Annotated
  with unhashable metadata.</li>
<li>gh-111775: Fix importlib.resources.simple.ResourceHandle.open()
  for text mode, added missed stream argument.</li>
<li>gh-90095: Make .pdbrc and -c work with any valid pdb commands.</li>
<li>gh-107155: Fix incorrect output of help(x) where x is a lambda
  function, which has an <strong>annotations</strong> dictionary attribute with
  a "return" key.</li>
<li>gh-105866: Fixed _get_slots bug which caused error when defining
  dataclasses with slots and a weakref_slot.</li>
<li>gh-60346: Fix ArgumentParser inconsistent with parse_known_args.</li>
<li>gh-100985: Update HTTPSConnection to consistently wrap IPv6
  Addresses when using a proxy.</li>
<li>gh-100884: email: fix misfolding of comma in address-lists
  over multiple lines in combination with unicode encoding
  (bsc#1238450 CVE-2025-1795)</li>
<li>gh-95782: Fix io.BufferedReader.tell(),
  io.BufferedReader.seek(), _pyio.BufferedReader.tell(),
  io.BufferedRandom.tell(), io.BufferedRandom.seek() and
  _pyio.BufferedRandom.tell() being able to return negative
  offsets.</li>
<li>gh-96310: Fix a traceback in argparse when all options in a
  mutually exclusive group are suppressed.</li>
<li>gh-93205: Fixed a bug in
  logging.handlers.TimedRotatingFileHandler where multiple
  rotating handler instances pointing to files with the same name
  but different extensions would conflict and not delete the
  correct files.</li>
<li>bpo-44865: Add missing call to localization function in
  argparse.</li>
<li>bpo-43952: Fix multiprocessing.connection.Listener.accept() to
  accept empty bytes as authkey. Not accepting empty bytes as key
  causes it to hang indefinitely.</li>
<li>bpo-42125: linecache: get module name from <strong>spec</strong> if
  available. This allows getting source code for the <strong>main</strong>
  module when a custom loader is used.</li>
<li>gh-66543: Make mimetypes.guess_type() properly parsing of URLs
  with only a host name, URLs containing fragment or query, and
  filenames with only a UNC sharepoint on Windows. Based on patch
  by Dong-hee Na.</li>
<li>bpo-33775: Add ‘default’ and ‘version’ help text for
  localization in argparse.</li>
</ul>
</li>
<li>Documentation<ul>
<li>gh-115399: Document CVE-2023-52425 of Expat <2.6.0 under “XML
  vulnerabilities”.</li>
<li>gh-115233: Fix an example for LoggerAdapter in the Logging
  Cookbook.</li>
</ul>
</li>
<li>Tests<ul>
<li>gh-83434: Disable JUnit XML output (--junit-xml=FILE command
  line option) in regrtest when hunting for reference leaks (-R
  option). Patch by Victor Stinner.</li>
<li>gh-117187: Fix XML tests for vanilla Expat <2.6.0.</li>
<li>gh-115979: Update test_importlib so that it passes under WASI
  SDK 21.</li>
<li>gh-116307: Added import helper isolated_modules as CleanImport
  does not remove modules imported during the context.</li>
<li>gh-115720: Leak tests (-R, --huntrleaks) now show a summary of
  the number of leaks found in each iteration.</li>
<li>gh-115122: Add --bisect option to regrtest test runner: run
  failed tests with test.bisect_cmd to identify failing tests.
  Patch by Victor Stinner.</li>
<li>gh-115596: Fix ProgramPriorityTests in test_os permanently
  changing the process priority.</li>
<li>gh-115198: Fix test_check_metadata_deprecate in distutils tests
  with a newer Docutils.</li>
</ul>
</li>
<li>Build<ul>
<li>gh-116313: Get WASI builds to work under wasmtime 18 w/ WASI
  0.2/preview2 primitives.</li>
<li>gh-115167: Avoid vendoring vcruntime140_threads.dll when
  building with Visual Studio 2022 version 17.8.</li>
</ul>
</li>
<li>Windows<ul>
<li>gh-116773: Fix instances of <_overlapped.Overlapped object at
  0xXXX> still has pending operation at deallocation, the process
  may crash.</li>
<li>gh-91227: Fix the asyncio ProactorEventLoop implementation so
  that sending a datagram to an address that is not listening does
  not prevent receiving any more datagrams.</li>
<li>gh-115554: The installer now has more strict rules about
  updating the Python Launcher for Windows. In general, most users
  only have a single launcher installed and will see no
  difference. When multiple launchers have been installed, the
  option to install the launcher is disabled until all but one
  have been removed. Downgrading the launcher (which was never
  allowed) is now more obviously blocked.</li>
<li>gh-115543: Python Launcher for Windows can now detect Python
  3.13 when installed from the Microsoft Store, and will install
  Python 3.12 by default when PYLAUNCHER_ALLOW_INSTALL is set.</li>
<li>gh-115009: Update Windows installer to use SQLite 3.45.1.</li>
</ul>
</li>
<li>IDLE<ul>
<li>gh-88516: On macOS show a proxy icon in the title bar of editor
  windows to match platform behaviour.</li>
</ul>
</li>
<li>Tools/Demos<ul>
<li>gh-113516: Don’t set LDSHARED when building for WASI.</li>
</ul>
</li>
<li>
<p>C API</p>
<ul>
<li>gh-117021: Fix integer overflow in PyLong_AsPid() on non-Windows
  64-bit platforms.</li>
</ul>
</li>
<li>
<p>Add reference to CVE-2024-0450 (bsc#1221854) to changelog.</p>
</li>
</ul>



    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                SUSE Linux Micro 6.0
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-6.0-253=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    SUSE Linux Micro 6.0 (aarch64 s390x x86_64)
                    <ul>
                        
                            <li>python311-3.11.11-1.1</li>
                        
                            <li>libpython3_11-1_0-debuginfo-3.11.11-1.1</li>
                        
                            <li>python311-curses-debuginfo-3.11.11-1.1</li>
                        
                            <li>python311-core-debugsource-3.11.11-1.1</li>
                        
                            <li>python311-curses-3.11.11-1.1</li>
                        
                            <li>python311-debugsource-3.11.11-1.1</li>
                        
                            <li>libpython3_11-1_0-3.11.11-1.1</li>
                        
                            <li>python311-base-3.11.11-1.1</li>
                        
                            <li>python311-debuginfo-3.11.11-1.1</li>
                        
                            <li>python311-base-debuginfo-3.11.11-1.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2019-20907.html">https://www.suse.com/security/cve/CVE-2019-20907.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2019-9947.html">https://www.suse.com/security/cve/CVE-2019-9947.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2020-15523.html">https://www.suse.com/security/cve/CVE-2020-15523.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2020-15801.html">https://www.suse.com/security/cve/CVE-2020-15801.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-25236.html">https://www.suse.com/security/cve/CVE-2022-25236.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-27043.html">https://www.suse.com/security/cve/CVE-2023-27043.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-52425.html">https://www.suse.com/security/cve/CVE-2023-52425.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-6597.html">https://www.suse.com/security/cve/CVE-2023-6597.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-0397.html">https://www.suse.com/security/cve/CVE-2024-0397.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-0450.html">https://www.suse.com/security/cve/CVE-2024-0450.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-4030.html">https://www.suse.com/security/cve/CVE-2024-4030.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-4032.html">https://www.suse.com/security/cve/CVE-2024-4032.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-6232.html">https://www.suse.com/security/cve/CVE-2024-6232.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-6923.html">https://www.suse.com/security/cve/CVE-2024-6923.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-7592.html">https://www.suse.com/security/cve/CVE-2024-7592.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-8088.html">https://www.suse.com/security/cve/CVE-2024-8088.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-9287.html">https://www.suse.com/security/cve/CVE-2024-9287.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-0938.html">https://www.suse.com/security/cve/CVE-2025-0938.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-1795.html">https://www.suse.com/security/cve/CVE-2025-1795.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1174091">https://bugzilla.suse.com/show_bug.cgi?id=1174091</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210638">https://bugzilla.suse.com/show_bug.cgi?id=1210638</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219559">https://bugzilla.suse.com/show_bug.cgi?id=1219559</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219666">https://bugzilla.suse.com/show_bug.cgi?id=1219666</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221854">https://bugzilla.suse.com/show_bug.cgi?id=1221854</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225660">https://bugzilla.suse.com/show_bug.cgi?id=1225660</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226447">https://bugzilla.suse.com/show_bug.cgi?id=1226447</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226448">https://bugzilla.suse.com/show_bug.cgi?id=1226448</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227378">https://bugzilla.suse.com/show_bug.cgi?id=1227378</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227999">https://bugzilla.suse.com/show_bug.cgi?id=1227999</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228165">https://bugzilla.suse.com/show_bug.cgi?id=1228165</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228780">https://bugzilla.suse.com/show_bug.cgi?id=1228780</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229596">https://bugzilla.suse.com/show_bug.cgi?id=1229596</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229704">https://bugzilla.suse.com/show_bug.cgi?id=1229704</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230227">https://bugzilla.suse.com/show_bug.cgi?id=1230227</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230906">https://bugzilla.suse.com/show_bug.cgi?id=1230906</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231795">https://bugzilla.suse.com/show_bug.cgi?id=1231795</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232241">https://bugzilla.suse.com/show_bug.cgi?id=1232241</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236705">https://bugzilla.suse.com/show_bug.cgi?id=1236705</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238450">https://bugzilla.suse.com/show_bug.cgi?id=1238450</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1239210">https://bugzilla.suse.com/show_bug.cgi?id=1239210</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=831629">https://bugzilla.suse.com/show_bug.cgi?id=831629</a>
                    </li>
                
            
        </ul>
    
</div>