<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for python3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:2859-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-11-18T11:42:34Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-11-18T11:42:34Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-11-18T11:42:34Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for python3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update provides Python 3.4.5, which brings many fixes and enhancements.

The following security issues have been fixed:

- CVE-2016-1000110: CGIHandler could have allowed setting of HTTP_PROXY environment
  variable based on user supplied Proxy request header. (bsc#989523)
- CVE-2016-0772: A vulnerability in smtplib could have allowed a MITM attacker to
  perform a startTLS stripping attack. (bsc#984751)
- CVE-2016-5636: A heap overflow in Python's zipimport module. (bsc#985177)
- CVE-2016-5699: A header injection flaw in urrlib2/urllib/httplib/http.client.
  (bsc#985348)

The update also includes the following non-security fixes:

- Don't force 3rd party C extensions to be built with -Werror=declaration-after-statement.
  (bsc#951166)
- Make urllib proxy var handling behave as usual on POSIX. (bsc#983582)

For a comprehensive list of changes please refer to the upstream change log:
https://docs.python.org/3.4/whatsnew/changelog.html
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-DESKTOP-12-SP2-2016-1676,SUSE-SLE-RPI-12-SP2-2016-1676,SUSE-SLE-SDK-12-SP2-2016-1676,SUSE-SLE-SERVER-12-SP2-2016-1676</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162859-1/</URL>
      <Description>Link for SUSE-SU-2016:2859-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:2859-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/951166</URL>
      <Description>SUSE Bug 951166</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/983582</URL>
      <Description>SUSE Bug 983582</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/984751</URL>
      <Description>SUSE Bug 984751</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/985177</URL>
      <Description>SUSE Bug 985177</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/985348</URL>
      <Description>SUSE Bug 985348</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/989523</URL>
      <Description>SUSE Bug 989523</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/991069</URL>
      <Description>SUSE Bug 991069</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0772/</URL>
      <Description>SUSE CVE CVE-2016-0772 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1000110/</URL>
      <Description>SUSE CVE CVE-2016-1000110 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5636/</URL>
      <Description>SUSE CVE CVE-2016-5636 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5699/</URL>
      <Description>SUSE CVE CVE-2016-5699 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP2" CPE="cpe:/o:suse:sled:12:sp2">SUSE Linux Enterprise Desktop 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2" CPE="cpe:/o:suse:sles:12:sp2">SUSE Linux Enterprise Server 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" CPE="cpe:/o:suse:sles:12:sp2">SUSE Linux Enterprise Server for Raspberry Pi 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP2" CPE="cpe:/o:suse:sles_sap:12:sp2">SUSE Linux Enterprise Server for SAP Applications 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP2" CPE="cpe:/o:suse:sle-sdk:12:sp2">SUSE Linux Enterprise Software Development Kit 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libpython3_4m1_0-3.4.5-19.1">
      <FullProductName ProductID="libpython3_4m1_0-3.4.5-19.1">libpython3_4m1_0-3.4.5-19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-3.4.5-19.1">
      <FullProductName ProductID="python3-3.4.5-19.1">python3-3.4.5-19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-base-3.4.5-19.1">
      <FullProductName ProductID="python3-base-3.4.5-19.1">python3-base-3.4.5-19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-curses-3.4.5-19.1">
      <FullProductName ProductID="python3-curses-3.4.5-19.1">python3-curses-3.4.5-19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-devel-3.4.5-19.1">
      <FullProductName ProductID="python3-devel-3.4.5-19.1">python3-devel-3.4.5-19.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libpython3_4m1_0-3.4.5-19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP2:libpython3_4m1_0-3.4.5-19.1">libpython3_4m1_0-3.4.5-19.1 as a component of SUSE Linux Enterprise Desktop 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-3.4.5-19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP2:python3-3.4.5-19.1">python3-3.4.5-19.1 as a component of SUSE Linux Enterprise Desktop 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-base-3.4.5-19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP2:python3-base-3.4.5-19.1">python3-base-3.4.5-19.1 as a component of SUSE Linux Enterprise Desktop 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-curses-3.4.5-19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP2:python3-curses-3.4.5-19.1">python3-curses-3.4.5-19.1 as a component of SUSE Linux Enterprise Desktop 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpython3_4m1_0-3.4.5-19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2:libpython3_4m1_0-3.4.5-19.1">libpython3_4m1_0-3.4.5-19.1 as a component of SUSE Linux Enterprise Server 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-3.4.5-19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2:python3-3.4.5-19.1">python3-3.4.5-19.1 as a component of SUSE Linux Enterprise Server 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-base-3.4.5-19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2:python3-base-3.4.5-19.1">python3-base-3.4.5-19.1 as a component of SUSE Linux Enterprise Server 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-curses-3.4.5-19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2:python3-curses-3.4.5-19.1">python3-curses-3.4.5-19.1 as a component of SUSE Linux Enterprise Server 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpython3_4m1_0-3.4.5-19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpython3_4m1_0-3.4.5-19.1">libpython3_4m1_0-3.4.5-19.1 as a component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-3.4.5-19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:python3-3.4.5-19.1">python3-3.4.5-19.1 as a component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-base-3.4.5-19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:python3-base-3.4.5-19.1">python3-base-3.4.5-19.1 as a component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-curses-3.4.5-19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:python3-curses-3.4.5-19.1">python3-curses-3.4.5-19.1 as a component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpython3_4m1_0-3.4.5-19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpython3_4m1_0-3.4.5-19.1">libpython3_4m1_0-3.4.5-19.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-3.4.5-19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP2:python3-3.4.5-19.1">python3-3.4.5-19.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-base-3.4.5-19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP2:python3-base-3.4.5-19.1">python3-base-3.4.5-19.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-curses-3.4.5-19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP2:python3-curses-3.4.5-19.1">python3-curses-3.4.5-19.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-devel-3.4.5-19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP2:python3-devel-3.4.5-19.1">python3-devel-3.4.5-19.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."</Note>
    </Notes>
    <CVE>CVE-2016-0772</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:libpython3_4m1_0-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:python3-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:python3-base-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:python3-curses-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:libpython3_4m1_0-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:python3-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:python3-base-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:python3-curses-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpython3_4m1_0-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:python3-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:python3-base-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:python3-curses-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpython3_4m1_0-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:python3-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:python3-base-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:python3-curses-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:python3-devel-3.4.5-19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162859-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0772.html</URL>
        <Description>CVE-2016-0772</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984751</URL>
        <Description>SUSE Bug 984751</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CGIHandler class in Python before 2.7.12 does not protect against the HTTP_PROXY variable name clash in a CGI script, which could allow a remote attacker to redirect HTTP requests.</Note>
    </Notes>
    <CVE>CVE-2016-1000110</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:libpython3_4m1_0-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:python3-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:python3-base-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:python3-curses-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:libpython3_4m1_0-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:python3-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:python3-base-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:python3-curses-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpython3_4m1_0-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:python3-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:python3-base-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:python3-curses-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpython3_4m1_0-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:python3-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:python3-base-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:python3-curses-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:python3-devel-3.4.5-19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162859-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1000110.html</URL>
        <Description>CVE-2016-1000110</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/988484</URL>
        <Description>SUSE Bug 988484</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/989523</URL>
        <Description>SUSE Bug 989523</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2016-5636</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:libpython3_4m1_0-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:python3-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:python3-base-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:python3-curses-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:libpython3_4m1_0-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:python3-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:python3-base-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:python3-curses-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpython3_4m1_0-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:python3-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:python3-base-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:python3-curses-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpython3_4m1_0-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:python3-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:python3-base-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:python3-curses-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:python3-devel-3.4.5-19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162859-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5636.html</URL>
        <Description>CVE-2016-5636</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1065451</URL>
        <Description>SUSE Bug 1065451</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106262</URL>
        <Description>SUSE Bug 1106262</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/985177</URL>
        <Description>SUSE Bug 985177</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.</Note>
    </Notes>
    <CVE>CVE-2016-5699</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:libpython3_4m1_0-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:python3-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:python3-base-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:python3-curses-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:libpython3_4m1_0-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:python3-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:python3-base-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:python3-curses-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libpython3_4m1_0-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:python3-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:python3-base-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:python3-curses-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:libpython3_4m1_0-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:python3-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:python3-base-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:python3-curses-3.4.5-19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:python3-devel-3.4.5-19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162859-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5699.html</URL>
        <Description>CVE-2016-5699</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122729</URL>
        <Description>SUSE Bug 1122729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130840</URL>
        <Description>SUSE Bug 1130840</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/985348</URL>
        <Description>SUSE Bug 985348</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/985351</URL>
        <Description>SUSE Bug 985351</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986630</URL>
        <Description>SUSE Bug 986630</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
