<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for jython is now available for openEuler-24.03-LTS-SP1,openEuler-24.03-LTS-SP2,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2025-1758</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2025-07-11</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2025-07-11</InitialReleaseDate>
		<CurrentReleaseDate>2025-07-11</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2025-07-11</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">jython security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for jython is now available for openEuler-24.03-LTS-SP1,openEuler-24.03-LTS-SP2,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Jython is an implementation of the high-level, dynamic, object-oriented language Python seamlessly integrated with the Java platform. The predecessor to Jython, JPython, is certified as 100% Pure Java. Jython is freely available for both commercial and non-commercial use and is distributed with source code. Jython is complementary to Java and is especially suited for the following tasks: Embedded scripting - Java programmers can add the Jython libraries to their system to allow end users to write simple or complicated scripts that add functionality to the application. Interactive experimentation - Jython provides an interactive interpreter that can be used to interact with Java packages or with running Java applications. This allows programmers to experiment and debug any Java system using Jython. Rapid application development - Python programs are typically 2-10X shorter than the equivalent Java program. This translates directly to increased programmer productivity. The seamless interaction between Python and Java allows developers to freely mix the two languages both during development and in shipping products.

Security Fix(es):

Python is an open source, object-oriented programming language from the Python Foundation. This language has the characteristics of scalability, supporting modules and packages, and supporting multiple platforms.
 There is a security vulnerability in Python that originates from the secondary complexity problem when handling specially crafted malformed inputs, which may lead to a denial of service attack.(CVE-2025-6069)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for jython is now available for master/openEuler-20.03-LTS-SP4/openEuler-22.03-LTS-SP3/openEuler-22.03-LTS-SP4/openEuler-24.03-LTS/openEuler-24.03-LTS-Next/openEuler-24.03-LTS-SP1/openEuler-24.03-LTS-SP2.

openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">jython</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1758</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-6069</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-6069</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openEuler-24.03-LTS-SP1</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS-SP2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openEuler-24.03-LTS-SP2</FullProductName>
			<FullProductName ProductID="openEuler-20.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openEuler-20.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">openEuler-22.03-LTS-SP3</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="jython-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">jython-2.7.1-3.oe2403sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="jython-demo-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">jython-demo-2.7.1-3.oe2403sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="jython-javadoc-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">jython-javadoc-2.7.1-3.oe2403sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="jython-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">jython-2.7.1-3.oe2403sp2.noarch.rpm</FullProductName>
			<FullProductName ProductID="jython-demo-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">jython-demo-2.7.1-3.oe2403sp2.noarch.rpm</FullProductName>
			<FullProductName ProductID="jython-javadoc-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">jython-javadoc-2.7.1-3.oe2403sp2.noarch.rpm</FullProductName>
			<FullProductName ProductID="jython-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">jython-2.7.1-3.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="jython-demo-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">jython-demo-2.7.1-3.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="jython-javadoc-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">jython-javadoc-2.7.1-3.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="jython-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">jython-2.7.1-3.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="jython-demo-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">jython-demo-2.7.1-3.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="jython-javadoc-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">jython-javadoc-2.7.1-3.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="jython-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">jython-2.7.1-3.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="jython-demo-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">jython-demo-2.7.1-3.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="jython-javadoc-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">jython-javadoc-2.7.1-3.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="jython-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">jython-2.7.1-3.oe2403.noarch.rpm</FullProductName>
			<FullProductName ProductID="jython-demo-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">jython-demo-2.7.1-3.oe2403.noarch.rpm</FullProductName>
			<FullProductName ProductID="jython-javadoc-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">jython-javadoc-2.7.1-3.oe2403.noarch.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="jython-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">jython-2.7.1-3.oe2403sp1.src.rpm</FullProductName>
			<FullProductName ProductID="jython-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">jython-2.7.1-3.oe2403sp2.src.rpm</FullProductName>
			<FullProductName ProductID="jython-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">jython-2.7.1-3.oe2003sp4.src.rpm</FullProductName>
			<FullProductName ProductID="jython-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">jython-2.7.1-3.oe2203sp3.src.rpm</FullProductName>
			<FullProductName ProductID="jython-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">jython-2.7.1-3.oe2203sp4.src.rpm</FullProductName>
			<FullProductName ProductID="jython-2.7.1-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">jython-2.7.1-3.oe2403.src.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Python is an open source, object-oriented programming language from the Python Foundation. This language has the characteristics of scalability, supporting modules and packages, and supporting multiple platforms.
 There is a security vulnerability in Python that originates from the secondary complexity problem when handling specially crafted malformed inputs, which may lead to a denial of service attack.</Note>
		</Notes>
		<ReleaseDate>2025-07-11</ReleaseDate>
		<CVE>CVE-2025-6069</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>4.3</BaseScore>
				<Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>jython security update</Description>
				<DATE>2025-07-11</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1758</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>