<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for python3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:0155-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-03-23T10:55:06Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-03-23T10:55:06Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-03-23T10:55:06Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for python3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for python3 fixes the following issues:

Security issue fixed:

- CVE-2019-5010: Fixed a denial-of-service vulnerability in the X509 certificate parser (bsc#1122191)
- CVE-2018-20406: Fixed a integer overflow via a large LONG_BINPUT (bsc#1120644)

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-155</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NY6OZIHZM76MZKDRQYP5AGGMPDVFH6AL/#NY6OZIHZM76MZKDRQYP5AGGMPDVFH6AL</URL>
      <Description>E-Mail link for openSUSE-SU-2019:0155-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120644</URL>
      <Description>SUSE Bug 1120644</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1122191</URL>
      <Description>SUSE Bug 1122191</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20406/</URL>
      <Description>SUSE CVE CVE-2018-20406 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-5010/</URL>
      <Description>SUSE CVE CVE-2019-5010 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0" CPE="cpe:/o:opensuse:leap:15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libpython3_6m1_0-3.6.5-lp150.2.6.1">
      <FullProductName ProductID="libpython3_6m1_0-3.6.5-lp150.2.6.1">libpython3_6m1_0-3.6.5-lp150.2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpython3_6m1_0-32bit-3.6.5-lp150.2.6.1">
      <FullProductName ProductID="libpython3_6m1_0-32bit-3.6.5-lp150.2.6.1">libpython3_6m1_0-32bit-3.6.5-lp150.2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-3.6.5-lp150.2.6.1">
      <FullProductName ProductID="python3-3.6.5-lp150.2.6.1">python3-3.6.5-lp150.2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-32bit-3.6.5-lp150.2.6.1">
      <FullProductName ProductID="python3-32bit-3.6.5-lp150.2.6.1">python3-32bit-3.6.5-lp150.2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-base-3.6.5-lp150.2.6.1">
      <FullProductName ProductID="python3-base-3.6.5-lp150.2.6.1">python3-base-3.6.5-lp150.2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-base-32bit-3.6.5-lp150.2.6.1">
      <FullProductName ProductID="python3-base-32bit-3.6.5-lp150.2.6.1">python3-base-32bit-3.6.5-lp150.2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-curses-3.6.5-lp150.2.6.1">
      <FullProductName ProductID="python3-curses-3.6.5-lp150.2.6.1">python3-curses-3.6.5-lp150.2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-dbm-3.6.5-lp150.2.6.1">
      <FullProductName ProductID="python3-dbm-3.6.5-lp150.2.6.1">python3-dbm-3.6.5-lp150.2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-devel-3.6.5-lp150.2.6.1">
      <FullProductName ProductID="python3-devel-3.6.5-lp150.2.6.1">python3-devel-3.6.5-lp150.2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-doc-3.6.5-lp150.2.6.1">
      <FullProductName ProductID="python3-doc-3.6.5-lp150.2.6.1">python3-doc-3.6.5-lp150.2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-idle-3.6.5-lp150.2.6.1">
      <FullProductName ProductID="python3-idle-3.6.5-lp150.2.6.1">python3-idle-3.6.5-lp150.2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-testsuite-3.6.5-lp150.2.6.1">
      <FullProductName ProductID="python3-testsuite-3.6.5-lp150.2.6.1">python3-testsuite-3.6.5-lp150.2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-tk-3.6.5-lp150.2.6.1">
      <FullProductName ProductID="python3-tk-3.6.5-lp150.2.6.1">python3-tk-3.6.5-lp150.2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-tools-3.6.5-lp150.2.6.1">
      <FullProductName ProductID="python3-tools-3.6.5-lp150.2.6.1">python3-tools-3.6.5-lp150.2.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libpython3_6m1_0-3.6.5-lp150.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libpython3_6m1_0-3.6.5-lp150.2.6.1">libpython3_6m1_0-3.6.5-lp150.2.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpython3_6m1_0-32bit-3.6.5-lp150.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libpython3_6m1_0-32bit-3.6.5-lp150.2.6.1">libpython3_6m1_0-32bit-3.6.5-lp150.2.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-3.6.5-lp150.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:python3-3.6.5-lp150.2.6.1">python3-3.6.5-lp150.2.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-32bit-3.6.5-lp150.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:python3-32bit-3.6.5-lp150.2.6.1">python3-32bit-3.6.5-lp150.2.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-base-3.6.5-lp150.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:python3-base-3.6.5-lp150.2.6.1">python3-base-3.6.5-lp150.2.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-base-32bit-3.6.5-lp150.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:python3-base-32bit-3.6.5-lp150.2.6.1">python3-base-32bit-3.6.5-lp150.2.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-curses-3.6.5-lp150.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:python3-curses-3.6.5-lp150.2.6.1">python3-curses-3.6.5-lp150.2.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-dbm-3.6.5-lp150.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:python3-dbm-3.6.5-lp150.2.6.1">python3-dbm-3.6.5-lp150.2.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-devel-3.6.5-lp150.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:python3-devel-3.6.5-lp150.2.6.1">python3-devel-3.6.5-lp150.2.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-doc-3.6.5-lp150.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:python3-doc-3.6.5-lp150.2.6.1">python3-doc-3.6.5-lp150.2.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-idle-3.6.5-lp150.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:python3-idle-3.6.5-lp150.2.6.1">python3-idle-3.6.5-lp150.2.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-testsuite-3.6.5-lp150.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:python3-testsuite-3.6.5-lp150.2.6.1">python3-testsuite-3.6.5-lp150.2.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-tk-3.6.5-lp150.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:python3-tk-3.6.5-lp150.2.6.1">python3-tk-3.6.5-lp150.2.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-tools-3.6.5-lp150.2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:python3-tools-3.6.5-lp150.2.6.1">python3-tools-3.6.5-lp150.2.6.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a "resize to twice the size" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used for serializing tens or hundreds of gigabytes of data. This issue is fixed in: v3.4.10, v3.4.10rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.7rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.7, v3.6.7rc1, v3.6.7rc2, v3.6.8, v3.6.8rc1, v3.6.9, v3.6.9rc1; v3.7.1, v3.7.1rc1, v3.7.1rc2, v3.7.2, v3.7.2rc1, v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.</Note>
    </Notes>
    <CVE>CVE-2018-20406</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libpython3_6m1_0-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libpython3_6m1_0-32bit-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-32bit-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-base-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-base-32bit-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-curses-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-dbm-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-devel-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-doc-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-idle-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-testsuite-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-tk-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-tools-3.6.5-lp150.2.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NY6OZIHZM76MZKDRQYP5AGGMPDVFH6AL/#NY6OZIHZM76MZKDRQYP5AGGMPDVFH6AL</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20406.html</URL>
        <Description>CVE-2018-20406</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120644</URL>
        <Description>SUSE Bug 1120644</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.</Note>
    </Notes>
    <CVE>CVE-2019-5010</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libpython3_6m1_0-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libpython3_6m1_0-32bit-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-32bit-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-base-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-base-32bit-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-curses-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-dbm-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-devel-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-doc-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-idle-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-testsuite-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-tk-3.6.5-lp150.2.6.1</ProductID>
        <ProductID>openSUSE Leap 15.0:python3-tools-3.6.5-lp150.2.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NY6OZIHZM76MZKDRQYP5AGGMPDVFH6AL/#NY6OZIHZM76MZKDRQYP5AGGMPDVFH6AL</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-5010.html</URL>
        <Description>CVE-2019-5010</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122191</URL>
        <Description>SUSE Bug 1122191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
