{"affected":[{"ecosystem_specific":{"binaries":[{"python313-uv":"0.7.18-160000.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 16.0","name":"python-uv","purl":"pkg:rpm/suse/python-uv&distro=SUSE%20Linux%20Enterprise%20Server%2016.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.7.18-160000.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"python313-uv":"0.7.18-160000.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP applications 16.0","name":"python-uv","purl":"pkg:rpm/suse/python-uv&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20applications%2016.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.7.18-160000.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for python-uv fixes the following issues:\n\n- CVE-2025-62518: astral-tokio-tar: Fixed boundary parsing issue\n  allowing attackers to smuggle additional archive entries\n  (bsc#1252399)\n- CVE-2025-58160: tracing-subscriber: Fixed log pollution (bsc#1249011)\n","id":"SUSE-SU-2026:20077-1","modified":"2026-01-13T12:49:17Z","published":"2026-01-13T12:49:17Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-202620077-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249011"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252399"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-58160"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-62518"}],"related":["CVE-2025-58160","CVE-2025-62518"],"summary":"Security update for python-uv","upstream":["CVE-2025-58160","CVE-2025-62518"]}