{"affected":[{"ecosystem_specific":{"binaries":[{"python-wheel":"0.30.0-2.7.1","python3-wheel":"0.30.0-2.7.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Public Cloud 12","name":"python-wheel","purl":"pkg:rpm/suse/python-wheel&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.30.0-2.7.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for python-wheel fixes the following issues:\n\n- CVE-2022-40898: Fixed an excessive use of CPU that could be triggered\n  via a crafted regular expression (bsc#1206670).\n","id":"SUSE-SU-2023:0089-1","modified":"2023-01-16T09:31:21Z","published":"2023-01-16T09:31:21Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20230089-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206670"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-40898"}],"related":["CVE-2022-40898"],"summary":"Security update for python-wheel","upstream":["CVE-2022-40898"]}