{"affected":[{"ecosystem_specific":{"binaries":[{"python36-setuptools":"44.1.1-8.12.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"python36-setuptools","purl":"pkg:rpm/suse/python36-setuptools&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"44.1.1-8.12.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"python36-setuptools":"44.1.1-8.12.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"python36-setuptools","purl":"pkg:rpm/suse/python36-setuptools&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"44.1.1-8.12.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for python36-setuptools fixes the following issues:\n\n- CVE-2025-47273: path traversal in PackageIndex.download may lead to an arbitrary file write (bsc#1243313).\n","id":"SUSE-SU-2025:01693-1","modified":"2025-05-23T12:48:03Z","published":"2025-05-23T12:48:03Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202501693-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243313"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-47273"}],"related":["CVE-2025-47273"],"summary":"Security update for python36-setuptools","upstream":["CVE-2025-47273"]}