<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Feature update for venv-salt-minion</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-FU-2022:0444-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2022-02-16T15:20:54Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-02-16T15:20:54Z</InitialReleaseDate>
    <CurrentReleaseDate>2022-02-16T15:20:54Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Feature update for venv-salt-minion</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This feature update for venv-salt-minion provides the following changes:

- Introduce `venv-salt-minion`.
- Track already fixed issues.
  </Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2022-444,SUSE-SLE-Manager-Tools-15-BETA-2022-444</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      <Description>Link for SUSE-FU-2022:0444-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html</URL>
      <Description>E-Mail link for SUSE-FU-2022:0444-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1000080</URL>
      <Description>SUSE Bug 1000080</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1000117</URL>
      <Description>SUSE Bug 1000117</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1000194</URL>
      <Description>SUSE Bug 1000194</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1000742</URL>
      <Description>SUSE Bug 1000742</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1002895</URL>
      <Description>SUSE Bug 1002895</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1003091</URL>
      <Description>SUSE Bug 1003091</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1005246</URL>
      <Description>SUSE Bug 1005246</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010874</URL>
      <Description>SUSE Bug 1010874</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010966</URL>
      <Description>SUSE Bug 1010966</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1011936</URL>
      <Description>SUSE Bug 1011936</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1015549</URL>
      <Description>SUSE Bug 1015549</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1027610</URL>
      <Description>SUSE Bug 1027610</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1027705</URL>
      <Description>SUSE Bug 1027705</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1029902</URL>
      <Description>SUSE Bug 1029902</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1030038</URL>
      <Description>SUSE Bug 1030038</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1032118</URL>
      <Description>SUSE Bug 1032118</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1032119</URL>
      <Description>SUSE Bug 1032119</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1035604</URL>
      <Description>SUSE Bug 1035604</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1039469</URL>
      <Description>SUSE Bug 1039469</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1040164</URL>
      <Description>SUSE Bug 1040164</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1040256</URL>
      <Description>SUSE Bug 1040256</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1041090</URL>
      <Description>SUSE Bug 1041090</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1042670</URL>
      <Description>SUSE Bug 1042670</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1049186</URL>
      <Description>SUSE Bug 1049186</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1049304</URL>
      <Description>SUSE Bug 1049304</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1050653</URL>
      <Description>SUSE Bug 1050653</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1050665</URL>
      <Description>SUSE Bug 1050665</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1055478</URL>
      <Description>SUSE Bug 1055478</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1055542</URL>
      <Description>SUSE Bug 1055542</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1056951</URL>
      <Description>SUSE Bug 1056951</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1057496</URL>
      <Description>SUSE Bug 1057496</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1062237</URL>
      <Description>SUSE Bug 1062237</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1066873</URL>
      <Description>SUSE Bug 1066873</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1068790</URL>
      <Description>SUSE Bug 1068790</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1070737</URL>
      <Description>SUSE Bug 1070737</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1070738</URL>
      <Description>SUSE Bug 1070738</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1070853</URL>
      <Description>SUSE Bug 1070853</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1071941</URL>
      <Description>SUSE Bug 1071941</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1073310</URL>
      <Description>SUSE Bug 1073310</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1073845</URL>
      <Description>SUSE Bug 1073845</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1073879</URL>
      <Description>SUSE Bug 1073879</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1074247</URL>
      <Description>SUSE Bug 1074247</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1076519</URL>
      <Description>SUSE Bug 1076519</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1077096</URL>
      <Description>SUSE Bug 1077096</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1077230</URL>
      <Description>SUSE Bug 1077230</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1078329</URL>
      <Description>SUSE Bug 1078329</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1079761</URL>
      <Description>SUSE Bug 1079761</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1080301</URL>
      <Description>SUSE Bug 1080301</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1081005</URL>
      <Description>SUSE Bug 1081005</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1081750</URL>
      <Description>SUSE Bug 1081750</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1081751</URL>
      <Description>SUSE Bug 1081751</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082155</URL>
      <Description>SUSE Bug 1082155</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082163</URL>
      <Description>SUSE Bug 1082163</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1082318</URL>
      <Description>SUSE Bug 1082318</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1083826</URL>
      <Description>SUSE Bug 1083826</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1084117</URL>
      <Description>SUSE Bug 1084117</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1084157</URL>
      <Description>SUSE Bug 1084157</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1085276</URL>
      <Description>SUSE Bug 1085276</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1085529</URL>
      <Description>SUSE Bug 1085529</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1085661</URL>
      <Description>SUSE Bug 1085661</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1087104</URL>
      <Description>SUSE Bug 1087104</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1088573</URL>
      <Description>SUSE Bug 1088573</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1090427</URL>
      <Description>SUSE Bug 1090427</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1090953</URL>
      <Description>SUSE Bug 1090953</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1093518</URL>
      <Description>SUSE Bug 1093518</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1093917</URL>
      <Description>SUSE Bug 1093917</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1094788</URL>
      <Description>SUSE Bug 1094788</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1094814</URL>
      <Description>SUSE Bug 1094814</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1094883</URL>
      <Description>SUSE Bug 1094883</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1095267</URL>
      <Description>SUSE Bug 1095267</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1096738</URL>
      <Description>SUSE Bug 1096738</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1096937</URL>
      <Description>SUSE Bug 1096937</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1097531</URL>
      <Description>SUSE Bug 1097531</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1098535</URL>
      <Description>SUSE Bug 1098535</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1099308</URL>
      <Description>SUSE Bug 1099308</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1099569</URL>
      <Description>SUSE Bug 1099569</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1102868</URL>
      <Description>SUSE Bug 1102868</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1108508</URL>
      <Description>SUSE Bug 1108508</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1109882</URL>
      <Description>SUSE Bug 1109882</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1109998</URL>
      <Description>SUSE Bug 1109998</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1110435</URL>
      <Description>SUSE Bug 1110435</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1110869</URL>
      <Description>SUSE Bug 1110869</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1110871</URL>
      <Description>SUSE Bug 1110871</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1111493</URL>
      <Description>SUSE Bug 1111493</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1111622</URL>
      <Description>SUSE Bug 1111622</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1111657</URL>
      <Description>SUSE Bug 1111657</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112357</URL>
      <Description>SUSE Bug 1112357</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1115769</URL>
      <Description>SUSE Bug 1115769</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1118611</URL>
      <Description>SUSE Bug 1118611</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1119376</URL>
      <Description>SUSE Bug 1119376</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1119416</URL>
      <Description>SUSE Bug 1119416</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1119792</URL>
      <Description>SUSE Bug 1119792</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1121717</URL>
      <Description>SUSE Bug 1121717</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1121852</URL>
      <Description>SUSE Bug 1121852</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1122191</URL>
      <Description>SUSE Bug 1122191</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1123064</URL>
      <Description>SUSE Bug 1123064</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1123185</URL>
      <Description>SUSE Bug 1123185</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1123186</URL>
      <Description>SUSE Bug 1123186</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1123558</URL>
      <Description>SUSE Bug 1123558</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1124885</URL>
      <Description>SUSE Bug 1124885</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1125815</URL>
      <Description>SUSE Bug 1125815</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1126283</URL>
      <Description>SUSE Bug 1126283</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1126318</URL>
      <Description>SUSE Bug 1126318</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1127173</URL>
      <Description>SUSE Bug 1127173</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1128146</URL>
      <Description>SUSE Bug 1128146</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1128323</URL>
      <Description>SUSE Bug 1128323</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1128355</URL>
      <Description>SUSE Bug 1128355</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1129071</URL>
      <Description>SUSE Bug 1129071</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1129566</URL>
      <Description>SUSE Bug 1129566</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1130840</URL>
      <Description>SUSE Bug 1130840</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1132174</URL>
      <Description>SUSE Bug 1132174</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1132323</URL>
      <Description>SUSE Bug 1132323</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1132455</URL>
      <Description>SUSE Bug 1132455</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1132663</URL>
      <Description>SUSE Bug 1132663</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1132900</URL>
      <Description>SUSE Bug 1132900</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1135009</URL>
      <Description>SUSE Bug 1135009</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1136444</URL>
      <Description>SUSE Bug 1136444</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1138666</URL>
      <Description>SUSE Bug 1138666</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1138715</URL>
      <Description>SUSE Bug 1138715</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1138746</URL>
      <Description>SUSE Bug 1138746</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1139915</URL>
      <Description>SUSE Bug 1139915</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1140255</URL>
      <Description>SUSE Bug 1140255</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1141168</URL>
      <Description>SUSE Bug 1141168</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1142899</URL>
      <Description>SUSE Bug 1142899</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1143033</URL>
      <Description>SUSE Bug 1143033</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1143454</URL>
      <Description>SUSE Bug 1143454</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1143893</URL>
      <Description>SUSE Bug 1143893</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1144506</URL>
      <Description>SUSE Bug 1144506</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1149686</URL>
      <Description>SUSE Bug 1149686</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1149792</URL>
      <Description>SUSE Bug 1149792</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1150190</URL>
      <Description>SUSE Bug 1150190</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1150895</URL>
      <Description>SUSE Bug 1150895</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1153830</URL>
      <Description>SUSE Bug 1153830</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1155815</URL>
      <Description>SUSE Bug 1155815</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1156677</URL>
      <Description>SUSE Bug 1156677</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1156694</URL>
      <Description>SUSE Bug 1156694</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1156908</URL>
      <Description>SUSE Bug 1156908</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1157104</URL>
      <Description>SUSE Bug 1157104</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1157354</URL>
      <Description>SUSE Bug 1157354</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1159235</URL>
      <Description>SUSE Bug 1159235</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1159538</URL>
      <Description>SUSE Bug 1159538</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1161557</URL>
      <Description>SUSE Bug 1161557</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1161770</URL>
      <Description>SUSE Bug 1161770</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1162224</URL>
      <Description>SUSE Bug 1162224</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1162367</URL>
      <Description>SUSE Bug 1162367</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1162743</URL>
      <Description>SUSE Bug 1162743</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1163978</URL>
      <Description>SUSE Bug 1163978</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1164310</URL>
      <Description>SUSE Bug 1164310</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1165439</URL>
      <Description>SUSE Bug 1165439</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1165578</URL>
      <Description>SUSE Bug 1165578</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1165730</URL>
      <Description>SUSE Bug 1165730</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1165823</URL>
      <Description>SUSE Bug 1165823</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1165960</URL>
      <Description>SUSE Bug 1165960</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1166139</URL>
      <Description>SUSE Bug 1166139</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1166758</URL>
      <Description>SUSE Bug 1166758</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1167008</URL>
      <Description>SUSE Bug 1167008</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1167501</URL>
      <Description>SUSE Bug 1167501</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1167732</URL>
      <Description>SUSE Bug 1167732</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1167746</URL>
      <Description>SUSE Bug 1167746</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1168480</URL>
      <Description>SUSE Bug 1168480</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1168973</URL>
      <Description>SUSE Bug 1168973</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1169489</URL>
      <Description>SUSE Bug 1169489</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1170175</URL>
      <Description>SUSE Bug 1170175</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1170863</URL>
      <Description>SUSE Bug 1170863</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171368</URL>
      <Description>SUSE Bug 1171368</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171561</URL>
      <Description>SUSE Bug 1171561</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172226</URL>
      <Description>SUSE Bug 1172226</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172908</URL>
      <Description>SUSE Bug 1172908</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172928</URL>
      <Description>SUSE Bug 1172928</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173226</URL>
      <Description>SUSE Bug 1173226</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173356</URL>
      <Description>SUSE Bug 1173356</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174009</URL>
      <Description>SUSE Bug 1174009</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174091</URL>
      <Description>SUSE Bug 1174091</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174514</URL>
      <Description>SUSE Bug 1174514</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175729</URL>
      <Description>SUSE Bug 1175729</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176116</URL>
      <Description>SUSE Bug 1176116</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176129</URL>
      <Description>SUSE Bug 1176129</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176134</URL>
      <Description>SUSE Bug 1176134</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176232</URL>
      <Description>SUSE Bug 1176232</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176256</URL>
      <Description>SUSE Bug 1176256</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176257</URL>
      <Description>SUSE Bug 1176257</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176258</URL>
      <Description>SUSE Bug 1176258</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176259</URL>
      <Description>SUSE Bug 1176259</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176262</URL>
      <Description>SUSE Bug 1176262</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176389</URL>
      <Description>SUSE Bug 1176389</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176785</URL>
      <Description>SUSE Bug 1176785</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176977</URL>
      <Description>SUSE Bug 1176977</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177120</URL>
      <Description>SUSE Bug 1177120</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177127</URL>
      <Description>SUSE Bug 1177127</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177559</URL>
      <Description>SUSE Bug 1177559</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178168</URL>
      <Description>SUSE Bug 1178168</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178341</URL>
      <Description>SUSE Bug 1178341</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178670</URL>
      <Description>SUSE Bug 1178670</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179562</URL>
      <Description>SUSE Bug 1179562</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179630</URL>
      <Description>SUSE Bug 1179630</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179805</URL>
      <Description>SUSE Bug 1179805</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180125</URL>
      <Description>SUSE Bug 1180125</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180781</URL>
      <Description>SUSE Bug 1180781</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181126</URL>
      <Description>SUSE Bug 1181126</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181324</URL>
      <Description>SUSE Bug 1181324</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181944</URL>
      <Description>SUSE Bug 1181944</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1182066</URL>
      <Description>SUSE Bug 1182066</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1182211</URL>
      <Description>SUSE Bug 1182211</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1182244</URL>
      <Description>SUSE Bug 1182244</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1182264</URL>
      <Description>SUSE Bug 1182264</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1182379</URL>
      <Description>SUSE Bug 1182379</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1182963</URL>
      <Description>SUSE Bug 1182963</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1183059</URL>
      <Description>SUSE Bug 1183059</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1183374</URL>
      <Description>SUSE Bug 1183374</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1183858</URL>
      <Description>SUSE Bug 1183858</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184505</URL>
      <Description>SUSE Bug 1184505</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185588</URL>
      <Description>SUSE Bug 1185588</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185706</URL>
      <Description>SUSE Bug 1185706</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185748</URL>
      <Description>SUSE Bug 1185748</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1186738</URL>
      <Description>SUSE Bug 1186738</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1187045</URL>
      <Description>SUSE Bug 1187045</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190781</URL>
      <Description>SUSE Bug 1190781</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1193357</URL>
      <Description>SUSE Bug 1193357</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/428177</URL>
      <Description>SUSE Bug 428177</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/431945</URL>
      <Description>SUSE Bug 431945</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/637176</URL>
      <Description>SUSE Bug 637176</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/657698</URL>
      <Description>SUSE Bug 657698</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/658604</URL>
      <Description>SUSE Bug 658604</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/673071</URL>
      <Description>SUSE Bug 673071</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/715423</URL>
      <Description>SUSE Bug 715423</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/743787</URL>
      <Description>SUSE Bug 743787</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/747125</URL>
      <Description>SUSE Bug 747125</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/750618</URL>
      <Description>SUSE Bug 750618</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/751718</URL>
      <Description>SUSE Bug 751718</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/754447</URL>
      <Description>SUSE Bug 754447</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/754677</URL>
      <Description>SUSE Bug 754677</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/761500</URL>
      <Description>SUSE Bug 761500</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/784670</URL>
      <Description>SUSE Bug 784670</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/787526</URL>
      <Description>SUSE Bug 787526</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/799119</URL>
      <Description>SUSE Bug 799119</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/809831</URL>
      <Description>SUSE Bug 809831</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/811890</URL>
      <Description>SUSE Bug 811890</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/825221</URL>
      <Description>SUSE Bug 825221</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/828513</URL>
      <Description>SUSE Bug 828513</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/831629</URL>
      <Description>SUSE Bug 831629</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/834601</URL>
      <Description>SUSE Bug 834601</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/835687</URL>
      <Description>SUSE Bug 835687</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/839107</URL>
      <Description>SUSE Bug 839107</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/84331</URL>
      <Description>SUSE Bug 84331</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/855666</URL>
      <Description>SUSE Bug 855666</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/858239</URL>
      <Description>SUSE Bug 858239</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/867887</URL>
      <Description>SUSE Bug 867887</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/871152</URL>
      <Description>SUSE Bug 871152</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/885662</URL>
      <Description>SUSE Bug 885662</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/885882</URL>
      <Description>SUSE Bug 885882</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/889363</URL>
      <Description>SUSE Bug 889363</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/892480</URL>
      <Description>SUSE Bug 892480</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/898917</URL>
      <Description>SUSE Bug 898917</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/907584</URL>
      <Description>SUSE Bug 907584</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/912460</URL>
      <Description>SUSE Bug 912460</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/913229</URL>
      <Description>SUSE Bug 913229</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/915479</URL>
      <Description>SUSE Bug 915479</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/917607</URL>
      <Description>SUSE Bug 917607</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/917759</URL>
      <Description>SUSE Bug 917759</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/917815</URL>
      <Description>SUSE Bug 917815</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/922448</URL>
      <Description>SUSE Bug 922448</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/929736</URL>
      <Description>SUSE Bug 929736</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/930189</URL>
      <Description>SUSE Bug 930189</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/931978</URL>
      <Description>SUSE Bug 931978</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/935856</URL>
      <Description>SUSE Bug 935856</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/937912</URL>
      <Description>SUSE Bug 937912</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/939456</URL>
      <Description>SUSE Bug 939456</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/940608</URL>
      <Description>SUSE Bug 940608</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/942385</URL>
      <Description>SUSE Bug 942385</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/942751</URL>
      <Description>SUSE Bug 942751</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/944204</URL>
      <Description>SUSE Bug 944204</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/945455</URL>
      <Description>SUSE Bug 945455</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/946648</URL>
      <Description>SUSE Bug 946648</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/947357</URL>
      <Description>SUSE Bug 947357</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/947679</URL>
      <Description>SUSE Bug 947679</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/948198</URL>
      <Description>SUSE Bug 948198</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/954486</URL>
      <Description>SUSE Bug 954486</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/954690</URL>
      <Description>SUSE Bug 954690</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/961334</URL>
      <Description>SUSE Bug 961334</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/962291</URL>
      <Description>SUSE Bug 962291</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/963974</URL>
      <Description>SUSE Bug 963974</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/964204</URL>
      <Description>SUSE Bug 964204</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/964472</URL>
      <Description>SUSE Bug 964472</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/964474</URL>
      <Description>SUSE Bug 964474</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/965830</URL>
      <Description>SUSE Bug 965830</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/967128</URL>
      <Description>SUSE Bug 967128</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/968270</URL>
      <Description>SUSE Bug 968270</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/968601</URL>
      <Description>SUSE Bug 968601</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/975875</URL>
      <Description>SUSE Bug 975875</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/981848</URL>
      <Description>SUSE Bug 981848</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/988086</URL>
      <Description>SUSE Bug 988086</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/992988</URL>
      <Description>SUSE Bug 992988</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/992989</URL>
      <Description>SUSE Bug 992989</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/992992</URL>
      <Description>SUSE Bug 992992</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/993130</URL>
      <Description>SUSE Bug 993130</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/993825</URL>
      <Description>SUSE Bug 993825</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/993968</URL>
      <Description>SUSE Bug 993968</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/994910</URL>
      <Description>SUSE Bug 994910</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/996255</URL>
      <Description>SUSE Bug 996255</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/997614</URL>
      <Description>SUSE Bug 997614</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-3389/</URL>
      <Description>SUSE CVE CVE-2011-3389 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-4944/</URL>
      <Description>SUSE CVE CVE-2011-4944 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-0845/</URL>
      <Description>SUSE CVE CVE-2012-0845 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1150/</URL>
      <Description>SUSE CVE CVE-2012-1150 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1752/</URL>
      <Description>SUSE CVE CVE-2013-1752 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4238/</URL>
      <Description>SUSE CVE CVE-2013-4238 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4314/</URL>
      <Description>SUSE CVE CVE-2013-4314 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0012/</URL>
      <Description>SUSE CVE CVE-2014-0012 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1829/</URL>
      <Description>SUSE CVE CVE-2014-1829 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1830/</URL>
      <Description>SUSE CVE CVE-2014-1830 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-2667/</URL>
      <Description>SUSE CVE CVE-2014-2667 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-4650/</URL>
      <Description>SUSE CVE CVE-2014-4650 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-7202/</URL>
      <Description>SUSE CVE CVE-2014-7202 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-7203/</URL>
      <Description>SUSE CVE CVE-2014-7203 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9721/</URL>
      <Description>SUSE CVE CVE-2014-9721 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2296/</URL>
      <Description>SUSE CVE CVE-2015-2296 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10745/</URL>
      <Description>SUSE CVE CVE-2016-10745 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9015/</URL>
      <Description>SUSE CVE CVE-2016-9015 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-18342/</URL>
      <Description>SUSE CVE CVE-2017-18342 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18074/</URL>
      <Description>SUSE CVE CVE-2018-18074 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20060/</URL>
      <Description>SUSE CVE CVE-2018-20060 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7750/</URL>
      <Description>SUSE CVE CVE-2018-7750 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10906/</URL>
      <Description>SUSE CVE CVE-2019-10906 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11236/</URL>
      <Description>SUSE CVE CVE-2019-11236 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11324/</URL>
      <Description>SUSE CVE CVE-2019-11324 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-13132/</URL>
      <Description>SUSE CVE CVE-2019-13132 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-20907/</URL>
      <Description>SUSE CVE CVE-2019-20907 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-20916/</URL>
      <Description>SUSE CVE CVE-2019-20916 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-5010/</URL>
      <Description>SUSE CVE CVE-2019-5010 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6250/</URL>
      <Description>SUSE CVE CVE-2019-6250 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8341/</URL>
      <Description>SUSE CVE CVE-2019-8341 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9740/</URL>
      <Description>SUSE CVE CVE-2019-9740 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9947/</URL>
      <Description>SUSE CVE CVE-2019-9947 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-14343/</URL>
      <Description>SUSE CVE CVE-2020-14343 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15166/</URL>
      <Description>SUSE CVE CVE-2020-15166 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15523/</URL>
      <Description>SUSE CVE CVE-2020-15523 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15801/</URL>
      <Description>SUSE CVE CVE-2020-15801 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-1747/</URL>
      <Description>SUSE CVE CVE-2020-1747 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-25659/</URL>
      <Description>SUSE CVE CVE-2020-25659 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-26137/</URL>
      <Description>SUSE CVE CVE-2020-26137 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27783/</URL>
      <Description>SUSE CVE CVE-2020-27783 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-28493/</URL>
      <Description>SUSE CVE CVE-2020-28493 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29651/</URL>
      <Description>SUSE CVE CVE-2020-29651 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-36242/</URL>
      <Description>SUSE CVE CVE-2020-36242 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-8492/</URL>
      <Description>SUSE CVE CVE-2020-8492 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-23336/</URL>
      <Description>SUSE CVE CVE-2021-23336 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-28957/</URL>
      <Description>SUSE CVE CVE-2021-28957 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29921/</URL>
      <Description>SUSE CVE CVE-2021-29921 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3177/</URL>
      <Description>SUSE CVE CVE-2021-3177 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-33503/</URL>
      <Description>SUSE CVE CVE-2021-33503 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3426/</URL>
      <Description>SUSE CVE CVE-2021-3426 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="saltbundle-libsodium-1.0.16-159000.3.3.3">
      <FullProductName ProductID="saltbundle-libsodium-1.0.16-159000.3.3.3">saltbundle-libsodium-1.0.16-159000.3.3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundle-libsodium-devel-1.0.16-159000.3.3.3">
      <FullProductName ProductID="saltbundle-libsodium-devel-1.0.16-159000.3.3.3">saltbundle-libsodium-devel-1.0.16-159000.3.3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundle-libzmq-4.2.3-159000.3.3.2">
      <FullProductName ProductID="saltbundle-libzmq-4.2.3-159000.3.3.2">saltbundle-libzmq-4.2.3-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundle-swig-4.0.2-159000.3.3.2">
      <FullProductName ProductID="saltbundle-swig-4.0.2-159000.3.3.2">saltbundle-swig-4.0.2-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundle-swig-doc-4.0.2-159000.3.3.2">
      <FullProductName ProductID="saltbundle-swig-doc-4.0.2-159000.3.3.2">saltbundle-swig-doc-4.0.2-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundle-swig-examples-4.0.2-159000.3.3.2">
      <FullProductName ProductID="saltbundle-swig-examples-4.0.2-159000.3.3.2">saltbundle-swig-examples-4.0.2-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundle-zeromq-devel-4.2.3-159000.3.3.2">
      <FullProductName ProductID="saltbundle-zeromq-devel-4.2.3-159000.3.3.2">saltbundle-zeromq-devel-4.2.3-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundle-zeromq-tools-4.2.3-159000.3.3.2">
      <FullProductName ProductID="saltbundle-zeromq-tools-4.2.3-159000.3.3.2">saltbundle-zeromq-tools-4.2.3-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-3.9.6-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-3.9.6-159000.3.3.2">saltbundlepy-3.9.6-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-appdirs-1.4.3-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-appdirs-1.4.3-159000.3.3.2">saltbundlepy-appdirs-1.4.3-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-asn1crypto-0.24.0-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-asn1crypto-0.24.0-159000.3.3.2">saltbundlepy-asn1crypto-0.24.0-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-atomicwrites-1.1.5-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-atomicwrites-1.1.5-159000.3.3.2">saltbundlepy-atomicwrites-1.1.5-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-attrs-19.3.0-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-attrs-19.3.0-159000.3.3.2">saltbundlepy-attrs-19.3.0-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-base-3.9.6-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-base-3.9.6-159000.3.3.2">saltbundlepy-base-3.9.6-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-bcrypt-3.2.0-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-bcrypt-3.2.0-159000.3.3.2">saltbundlepy-bcrypt-3.2.0-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-certifi-2018.1.18-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-certifi-2018.1.18-159000.3.3.2">saltbundlepy-certifi-2018.1.18-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-cffi-1.13.2-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-cffi-1.13.2-159000.3.3.2">saltbundlepy-cffi-1.13.2-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-chardet-3.0.4-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-chardet-3.0.4-159000.3.3.2">saltbundlepy-chardet-3.0.4-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-cryptography-2.8-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-cryptography-2.8-159000.3.3.2">saltbundlepy-cryptography-2.8-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-cryptography-vectors-2.8-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-cryptography-vectors-2.8-159000.3.3.2">saltbundlepy-cryptography-vectors-2.8-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-cssselect-1.0.3-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-cssselect-1.0.3-159000.3.3.2">saltbundlepy-cssselect-1.0.3-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-curses-3.9.6-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-curses-3.9.6-159000.3.3.2">saltbundlepy-curses-3.9.6-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-cython-0.29.24-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-cython-0.29.24-159000.3.3.2">saltbundlepy-cython-0.29.24-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-dbm-3.9.6-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-dbm-3.9.6-159000.3.3.2">saltbundlepy-dbm-3.9.6-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-devel-3.9.6-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-devel-3.9.6-159000.3.3.2">saltbundlepy-devel-3.9.6-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-distro-1.5.0-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-distro-1.5.0-159000.3.3.2">saltbundlepy-distro-1.5.0-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-docker-4.2.0-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-docker-4.2.0-159000.3.3.2">saltbundlepy-docker-4.2.0-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-docker-pycreds-0.4.0-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-docker-pycreds-0.4.0-159000.3.3.2">saltbundlepy-docker-pycreds-0.4.0-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-docopt-0.6.2-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-docopt-0.6.2-159000.3.3.2">saltbundlepy-docopt-0.6.2-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-idna-2.6-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-idna-2.6-159000.3.3.2">saltbundlepy-idna-2.6-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-importlib-metadata-1.5.0-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-importlib-metadata-1.5.0-159000.3.3.2">saltbundlepy-importlib-metadata-1.5.0-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-jinja2-2.10.1-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-jinja2-2.10.1-159000.3.3.2">saltbundlepy-jinja2-2.10.1-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-jinja2-emacs-2.10.1-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-jinja2-emacs-2.10.1-159000.3.3.2">saltbundlepy-jinja2-emacs-2.10.1-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-jinja2-vim-2.10.1-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-jinja2-vim-2.10.1-159000.3.3.2">saltbundlepy-jinja2-vim-2.10.1-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-kiwi-9.23.20-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-kiwi-9.23.20-159000.3.3.2">saltbundlepy-kiwi-9.23.20-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-libs-3.9.6-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-libs-3.9.6-159000.3.3.2">saltbundlepy-libs-3.9.6-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-libvirt-8.0.0-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-libvirt-8.0.0-159000.3.3.2">saltbundlepy-libvirt-8.0.0-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-lxml-4.6.3-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-lxml-4.6.3-159000.3.3.2">saltbundlepy-lxml-4.6.3-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-lxml-devel-4.6.3-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-lxml-devel-4.6.3-159000.3.3.2">saltbundlepy-lxml-devel-4.6.3-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-lxml-doc-4.6.3-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-lxml-doc-4.6.3-159000.3.3.2">saltbundlepy-lxml-doc-4.6.3-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-m2crypto-0.35.2-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-m2crypto-0.35.2-159000.3.3.2">saltbundlepy-m2crypto-0.35.2-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-m2crypto-doc-0.35.2-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-m2crypto-doc-0.35.2-159000.3.3.2">saltbundlepy-m2crypto-doc-0.35.2-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-markupsafe-1.0-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-markupsafe-1.0-159000.3.3.2">saltbundlepy-markupsafe-1.0-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-more-itertools-4.2.0-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-more-itertools-4.2.0-159000.3.3.2">saltbundlepy-more-itertools-4.2.0-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-msgpack-0.5.6-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-msgpack-0.5.6-159000.3.3.2">saltbundlepy-msgpack-0.5.6-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-netaddr-0.7.19-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-netaddr-0.7.19-159000.3.3.2">saltbundlepy-netaddr-0.7.19-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-packaging-20.3-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-packaging-20.3-159000.3.3.2">saltbundlepy-packaging-20.3-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-paramiko-2.4.2-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-paramiko-2.4.2-159000.3.3.2">saltbundlepy-paramiko-2.4.2-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-paramiko-doc-2.4.2-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-paramiko-doc-2.4.2-159000.3.3.2">saltbundlepy-paramiko-doc-2.4.2-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pluggy-0.13.1-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-pluggy-0.13.1-159000.3.3.2">saltbundlepy-pluggy-0.13.1-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-psutil-5.8.0-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-psutil-5.8.0-159000.3.3.2">saltbundlepy-psutil-5.8.0-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-ptyprocess-0.5.2-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-ptyprocess-0.5.2-159000.3.3.2">saltbundlepy-ptyprocess-0.5.2-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-py-1.8.1-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-py-1.8.1-159000.3.3.2">saltbundlepy-py-1.8.1-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pyasn1-0.4.2-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-pyasn1-0.4.2-159000.3.3.2">saltbundlepy-pyasn1-0.4.2-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pyasn1-modules-0.2.1-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-pyasn1-modules-0.2.1-159000.3.3.2">saltbundlepy-pyasn1-modules-0.2.1-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pycparser-2.17-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-pycparser-2.17-159000.3.3.2">saltbundlepy-pycparser-2.17-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pycurl-7.43.0.2-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-pycurl-7.43.0.2-159000.3.3.2">saltbundlepy-pycurl-7.43.0.2-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pycurl-doc-7.43.0.2-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-pycurl-doc-7.43.0.2-159000.3.3.2">saltbundlepy-pycurl-doc-7.43.0.2-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pyinotify-0.9.6-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-pyinotify-0.9.6-159000.3.3.2">saltbundlepy-pyinotify-0.9.6-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pynacl-1.2.1-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-pynacl-1.2.1-159000.3.3.2">saltbundlepy-pynacl-1.2.1-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pyopenssl-19.0.0-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-pyopenssl-19.0.0-159000.3.3.2">saltbundlepy-pyopenssl-19.0.0-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pyparsing-2.4.7-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-pyparsing-2.4.7-159000.3.3.2">saltbundlepy-pyparsing-2.4.7-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pysocks-1.6.8-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-pysocks-1.6.8-159000.3.3.2">saltbundlepy-pysocks-1.6.8-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pytest-3.10.1-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-pytest-3.10.1-159000.3.3.2">saltbundlepy-pytest-3.10.1-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pytz-2021.1-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-pytz-2021.1-159000.3.3.2">saltbundlepy-pytz-2021.1-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pyxattr-0.7.2-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-pyxattr-0.7.2-159000.3.3.2">saltbundlepy-pyxattr-0.7.2-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pyyaml-5.4.1-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-pyyaml-5.4.1-159000.3.3.2">saltbundlepy-pyyaml-5.4.1-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pyzmq-22.2.1-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-pyzmq-22.2.1-159000.3.3.2">saltbundlepy-pyzmq-22.2.1-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pyzmq-devel-22.2.1-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-pyzmq-devel-22.2.1-159000.3.3.2">saltbundlepy-pyzmq-devel-22.2.1-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-requests-2.24.0-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-requests-2.24.0-159000.3.3.2">saltbundlepy-requests-2.24.0-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-rpm-generators-20211001.fc6c04e-159000.3.3.3">
      <FullProductName ProductID="saltbundlepy-rpm-generators-20211001.fc6c04e-159000.3.3.3">saltbundlepy-rpm-generators-20211001.fc6c04e-159000.3.3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-rpm-macros-20211001.fc6c04e-159000.3.3.3">
      <FullProductName ProductID="saltbundlepy-rpm-macros-20211001.fc6c04e-159000.3.3.3">saltbundlepy-rpm-macros-20211001.fc6c04e-159000.3.3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-rpm-vercmp-0.1.2-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-rpm-vercmp-0.1.2-159000.3.3.2">saltbundlepy-rpm-vercmp-0.1.2-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-setuptools-44.1.1-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-setuptools-44.1.1-159000.3.3.2">saltbundlepy-setuptools-44.1.1-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-setuptools-scm-3.5.0-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-setuptools-scm-3.5.0-159000.3.3.2">saltbundlepy-setuptools-scm-3.5.0-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-simplejson-3.17.2-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-simplejson-3.17.2-159000.3.3.2">saltbundlepy-simplejson-3.17.2-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-six-1.14.0-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-six-1.14.0-159000.3.3.2">saltbundlepy-six-1.14.0-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-testsuite-3.9.6-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-testsuite-3.9.6-159000.3.3.2">saltbundlepy-testsuite-3.9.6-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-tk-3.9.6-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-tk-3.9.6-159000.3.3.2">saltbundlepy-tk-3.9.6-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-tools-3.9.6-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-tools-3.9.6-159000.3.3.2">saltbundlepy-tools-3.9.6-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-tornado-4.5.3-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-tornado-4.5.3-159000.3.3.2">saltbundlepy-tornado-4.5.3-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-urllib3-1.25.10-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-urllib3-1.25.10-159000.3.3.2">saltbundlepy-urllib3-1.25.10-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-venvjail-0.2.git.1634900618.b13fb73-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-venvjail-0.2.git.1634900618.b13fb73-159000.3.3.2">saltbundlepy-venvjail-0.2.git.1634900618.b13fb73-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-websocket-client-0.57.0-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-websocket-client-0.57.0-159000.3.3.2">saltbundlepy-websocket-client-0.57.0-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-zipp-0.6.0-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-zipp-0.6.0-159000.3.3.2">saltbundlepy-zipp-0.6.0-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-zypp-plugin-0.6.3-159000.3.3.2">
      <FullProductName ProductID="saltbundlepy-zypp-plugin-0.6.3-159000.3.3.2">saltbundlepy-zypp-plugin-0.6.3-159000.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="venv-salt-minion-3002.2-159000.3.3.2">
      <FullProductName ProductID="venv-salt-minion-3002.2-159000.3.3.2">venv-salt-minion-3002.2-159000.3.3.2</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.</Note>
    </Notes>
    <CVE>CVE-2011-3389</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3389.html</URL>
        <Description>CVE-2011-3389</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/716002</URL>
        <Description>SUSE Bug 716002</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/719047</URL>
        <Description>SUSE Bug 719047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/725167</URL>
        <Description>SUSE Bug 725167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/726096</URL>
        <Description>SUSE Bug 726096</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/739248</URL>
        <Description>SUSE Bug 739248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/739256</URL>
        <Description>SUSE Bug 739256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/742306</URL>
        <Description>SUSE Bug 742306</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/751718</URL>
        <Description>SUSE Bug 751718</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/759666</URL>
        <Description>SUSE Bug 759666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/763598</URL>
        <Description>SUSE Bug 763598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/814655</URL>
        <Description>SUSE Bug 814655</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.</Note>
    </Notes>
    <CVE>CVE-2011-4944</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-4944.html</URL>
        <Description>CVE-2011-4944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/754447</URL>
        <Description>SUSE Bug 754447</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.</Note>
    </Notes>
    <CVE>CVE-2012-0845</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-0845.html</URL>
        <Description>CVE-2012-0845</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/747125</URL>
        <Description>SUSE Bug 747125</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.</Note>
    </Notes>
    <CVE>CVE-2012-1150</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1150.html</URL>
        <Description>CVE-2012-1150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/751718</URL>
        <Description>SUSE Bug 751718</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/755383</URL>
        <Description>SUSE Bug 755383</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/826682</URL>
        <Description>SUSE Bug 826682</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 "Independently Fixable" in the CVE Counting Decisions</Note>
    </Notes>
    <CVE>CVE-2013-1752</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1752.html</URL>
        <Description>CVE-2013-1752</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/856835</URL>
        <Description>SUSE Bug 856835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/856836</URL>
        <Description>SUSE Bug 856836</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/863741</URL>
        <Description>SUSE Bug 863741</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/885882</URL>
        <Description>SUSE Bug 885882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/898572</URL>
        <Description>SUSE Bug 898572</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912739</URL>
        <Description>SUSE Bug 912739</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.</Note>
    </Notes>
    <CVE>CVE-2013-4238</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4238.html</URL>
        <Description>CVE-2013-4238</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/834601</URL>
        <Description>SUSE Bug 834601</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/839107</URL>
        <Description>SUSE Bug 839107</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/882915</URL>
        <Description>SUSE Bug 882915</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912739</URL>
        <Description>SUSE Bug 912739</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.</Note>
    </Notes>
    <CVE>CVE-2013-4314</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4314.html</URL>
        <Description>CVE-2013-4314</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/839107</URL>
        <Description>SUSE Bug 839107</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FileSystemBytecodeCache in Jinja2 2.7.2 does not properly create temporary directories, which allows local users to gain privileges by pre-creating a temporary directory with a user's uid.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1402.</Note>
    </Notes>
    <CVE>CVE-2014-0012</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0012.html</URL>
        <Description>CVE-2014-0012</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/858239</URL>
        <Description>SUSE Bug 858239</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Requests (aka python-requests) before 2.3.0 allows remote servers to obtain a netrc password by reading the Authorization header in a redirected request.</Note>
    </Notes>
    <CVE>CVE-2014-1829</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1829.html</URL>
        <Description>CVE-2014-1829</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/897658</URL>
        <Description>SUSE Bug 897658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Requests (aka python-requests) before 2.3.0 allows remote servers to obtain sensitive information by reading the Proxy-Authorization header in a redirected request.</Note>
    </Notes>
    <CVE>CVE-2014-1830</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1830.html</URL>
        <Description>CVE-2014-1830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/897658</URL>
        <Description>SUSE Bug 897658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.</Note>
    </Notes>
    <CVE>CVE-2014-2667</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-2667.html</URL>
        <Description>CVE-2014-2667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871152</URL>
        <Description>SUSE Bug 871152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.</Note>
    </Notes>
    <CVE>CVE-2014-4650</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-4650.html</URL>
        <Description>CVE-2014-4650</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/856835</URL>
        <Description>SUSE Bug 856835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/856836</URL>
        <Description>SUSE Bug 856836</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/863741</URL>
        <Description>SUSE Bug 863741</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/885882</URL>
        <Description>SUSE Bug 885882</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/898572</URL>
        <Description>SUSE Bug 898572</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912739</URL>
        <Description>SUSE Bug 912739</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">stream_engine.cpp in libzmq (aka ZeroMQ/C++)) 4.0.5 before 4.0.5 allows man-in-the-middle attackers to conduct downgrade attacks via a crafted connection request.</Note>
    </Notes>
    <CVE>CVE-2014-7202</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-7202.html</URL>
        <Description>CVE-2014-7202</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/898917</URL>
        <Description>SUSE Bug 898917</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libzmq (aka ZeroMQ/C++) 4.0.x before 4.0.5 does not ensure that nonces are unique, which allows man-in-the-middle attackers to conduct replay attacks via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2014-7203</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-7203.html</URL>
        <Description>CVE-2014-7203</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/898917</URL>
        <Description>SUSE Bug 898917</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libzmq before 4.0.6 and 4.1.x before 4.1.1 allows remote attackers to conduct downgrade attacks and bypass ZMTP v3 protocol security mechanisms via a ZMTP v2 or earlier header.</Note>
    </Notes>
    <CVE>CVE-2014-9721</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9721.html</URL>
        <Description>CVE-2014-9721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931978</URL>
        <Description>SUSE Bug 931978</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect.</Note>
    </Notes>
    <CVE>CVE-2015-2296</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.8</BaseScore>
        <Vector>AV:A/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2296.html</URL>
        <Description>CVE-2015-2296</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922448</URL>
        <Description>SUSE Bug 922448</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/926396</URL>
        <Description>SUSE Bug 926396</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.</Note>
    </Notes>
    <CVE>CVE-2016-10745</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10745.html</URL>
        <Description>CVE-2016-10745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132174</URL>
        <Description>SUSE Bug 1132174</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects users using versions 1.17 and 1.18 of the urllib3 library, who are using the optional PyOpenSSL support for TLS instead of the regular standard library TLS backend, and who are using OpenSSL 1.1.0 via PyOpenSSL. This is an extremely uncommon configuration, so the security impact of this vulnerability is low.</Note>
    </Notes>
    <CVE>CVE-2016-9015</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9015.html</URL>
        <Description>CVE-2016-9015</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1023502</URL>
        <Description>SUSE Bug 1023502</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024540</URL>
        <Description>SUSE Bug 1024540</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.</Note>
    </Notes>
    <CVE>CVE-2017-18342</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18342.html</URL>
        <Description>CVE-2017-18342</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1099308</URL>
        <Description>SUSE Bug 1099308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1164453</URL>
        <Description>SUSE Bug 1164453</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.</Note>
    </Notes>
    <CVE>CVE-2018-18074</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18074.html</URL>
        <Description>CVE-2018-18074</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111622</URL>
        <Description>SUSE Bug 1111622</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.</Note>
    </Notes>
    <CVE>CVE-2018-20060</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20060.html</URL>
        <Description>CVE-2018-20060</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119376</URL>
        <Description>SUSE Bug 1119376</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216275</URL>
        <Description>SUSE Bug 1216275</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.</Note>
    </Notes>
    <CVE>CVE-2018-7750</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7750.html</URL>
        <Description>CVE-2018-7750</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085276</URL>
        <Description>SUSE Bug 1085276</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111151</URL>
        <Description>SUSE Bug 1111151</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape.</Note>
    </Notes>
    <CVE>CVE-2019-10906</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10906.html</URL>
        <Description>CVE-2019-10906</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132323</URL>
        <Description>SUSE Bug 1132323</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.</Note>
    </Notes>
    <CVE>CVE-2019-11236</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11236.html</URL>
        <Description>CVE-2019-11236</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1129071</URL>
        <Description>SUSE Bug 1129071</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132663</URL>
        <Description>SUSE Bug 1132663</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument.</Note>
    </Notes>
    <CVE>CVE-2019-11324</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11324.html</URL>
        <Description>CVE-2019-11324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132900</URL>
        <Description>SUSE Bug 1132900</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ZeroMQ libzmq before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2, a remote, unauthenticated client connecting to a libzmq application, running with a socket listening with CURVE encryption/authentication enabled, may cause a stack overflow and overwrite the stack with arbitrary data, due to a buffer overflow in the library. Users running public servers with the above configuration are highly encouraged to upgrade as soon as possible, as there are no known mitigations.</Note>
    </Notes>
    <CVE>CVE-2019-13132</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-13132.html</URL>
        <Description>CVE-2019-13132</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140255</URL>
        <Description>SUSE Bug 1140255</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.</Note>
    </Notes>
    <CVE>CVE-2019-20907</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-20907.html</URL>
        <Description>CVE-2019-20907</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174091</URL>
        <Description>SUSE Bug 1174091</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.</Note>
    </Notes>
    <CVE>CVE-2019-20916</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-20916.html</URL>
        <Description>CVE-2019-20916</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176262</URL>
        <Description>SUSE Bug 1176262</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.</Note>
    </Notes>
    <CVE>CVE-2019-5010</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-5010.html</URL>
        <Description>CVE-2019-5010</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122191</URL>
        <Description>SUSE Bug 1122191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126909</URL>
        <Description>SUSE Bug 1126909</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated attacker to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitrary code on the target system. The memory layout allows the attacker to inject OS commands into a data structure located immediately after the problematic buffer (i.e., it is not necessary to use a typical buffer-overflow exploitation technique that changes the flow of control).</Note>
    </Notes>
    <CVE>CVE-2019-6250</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6250.html</URL>
        <Description>CVE-2019-6250</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121717</URL>
        <Description>SUSE Bug 1121717</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122012</URL>
        <Description>SUSE Bug 1122012</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing</Note>
    </Notes>
    <CVE>CVE-2019-8341</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8341.html</URL>
        <Description>CVE-2019-8341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125815</URL>
        <Description>SUSE Bug 1125815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.</Note>
    </Notes>
    <CVE>CVE-2019-9740</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9740.html</URL>
        <Description>CVE-2019-9740</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1129071</URL>
        <Description>SUSE Bug 1129071</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130840</URL>
        <Description>SUSE Bug 1130840</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132663</URL>
        <Description>SUSE Bug 1132663</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.</Note>
    </Notes>
    <CVE>CVE-2019-9947</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9947.html</URL>
        <Description>CVE-2019-9947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130840</URL>
        <Description>SUSE Bug 1130840</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1136184</URL>
        <Description>SUSE Bug 1136184</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155094</URL>
        <Description>SUSE Bug 1155094</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201559</URL>
        <Description>SUSE Bug 1201559</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.</Note>
    </Notes>
    <CVE>CVE-2020-14343</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-14343.html</URL>
        <Description>CVE-2020-14343</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174514</URL>
        <Description>SUSE Bug 1174514</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.</Note>
    </Notes>
    <CVE>CVE-2020-15166</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15166.html</URL>
        <Description>CVE-2020-15166</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176116</URL>
        <Description>SUSE Bug 1176116</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.</Note>
    </Notes>
    <CVE>CVE-2020-15523</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15523.html</URL>
        <Description>CVE-2020-15523</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173745</URL>
        <Description>SUSE Bug 1173745</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The &lt;executable-name&gt;._pth file (e.g., the python._pth file) is not affected.</Note>
    </Notes>
    <CVE>CVE-2020-15801</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15801.html</URL>
        <Description>CVE-2020-15801</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174241</URL>
        <Description>SUSE Bug 1174241</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.</Note>
    </Notes>
    <CVE>CVE-2020-1747</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-1747.html</URL>
        <Description>CVE-2020-1747</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165439</URL>
        <Description>SUSE Bug 1165439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174514</URL>
        <Description>SUSE Bug 1174514</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">python-cryptography 3.2 is vulnerable to Bleichenbacher timing attacks in the RSA decryption API, via timed processing of valid PKCS#1 v1.5 ciphertext.</Note>
    </Notes>
    <CVE>CVE-2020-25659</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-25659.html</URL>
        <Description>CVE-2020-25659</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178168</URL>
        <Description>SUSE Bug 1178168</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183152</URL>
        <Description>SUSE Bug 1183152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218043</URL>
        <Description>SUSE Bug 1218043</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.</Note>
    </Notes>
    <CVE>CVE-2020-26137</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-26137.html</URL>
        <Description>CVE-2020-26137</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177120</URL>
        <Description>SUSE Bug 1177120</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177211</URL>
        <Description>SUSE Bug 1177211</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code.</Note>
    </Notes>
    <CVE>CVE-2020-27783</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27783.html</URL>
        <Description>CVE-2020-27783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179534</URL>
        <Description>SUSE Bug 1179534</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.</Note>
    </Notes>
    <CVE>CVE-2020-28493</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-28493.html</URL>
        <Description>CVE-2020-28493</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181944</URL>
        <Description>SUSE Bug 1181944</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.</Note>
    </Notes>
    <CVE>CVE-2020-29651</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29651.html</URL>
        <Description>CVE-2020-29651</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179805</URL>
        <Description>SUSE Bug 1179805</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the cryptography package before 3.3.2 for Python, certain sequences of update calls to symmetrically encrypt multi-GB values could result in an integer overflow and buffer overflow, as demonstrated by the Fernet class.</Note>
    </Notes>
    <CVE>CVE-2020-36242</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-36242.html</URL>
        <Description>CVE-2020-36242</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182066</URL>
        <Description>SUSE Bug 1182066</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.</Note>
    </Notes>
    <CVE>CVE-2020-8492</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-8492.html</URL>
        <Description>CVE-2020-8492</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162367</URL>
        <Description>SUSE Bug 1162367</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.</Note>
    </Notes>
    <CVE>CVE-2021-23336</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-23336.html</URL>
        <Description>CVE-2021-23336</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182179</URL>
        <Description>SUSE Bug 1182179</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182379</URL>
        <Description>SUSE Bug 1182379</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182433</URL>
        <Description>SUSE Bug 1182433</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3.</Note>
    </Notes>
    <CVE>CVE-2021-28957</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-28957.html</URL>
        <Description>CVE-2021-28957</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184177</URL>
        <Description>SUSE Bug 1184177</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP addresses.</Note>
    </Notes>
    <CVE>CVE-2021-29921</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29921.html</URL>
        <Description>CVE-2021-29921</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185706</URL>
        <Description>SUSE Bug 1185706</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.</Note>
    </Notes>
    <CVE>CVE-2021-3177</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3177.html</URL>
        <Description>CVE-2021-3177</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181126</URL>
        <Description>SUSE Bug 1181126</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.</Note>
    </Notes>
    <CVE>CVE-2021-33503</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-33503.html</URL>
        <Description>CVE-2021-33503</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1187045</URL>
        <Description>SUSE Bug 1187045</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.</Note>
    </Notes>
    <CVE>CVE-2021-3426</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.7</BaseScore>
        <Vector>AV:A/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2022-444/suse-fu-20220444-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3426.html</URL>
        <Description>CVE-2021-3426</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183374</URL>
        <Description>SUSE Bug 1183374</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
