{"affected":[{"ecosystem_specific":{"binaries":[{"python3-nltk":"3.7-bp156.4.3.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15 SP6","name":"python-nltk","purl":"pkg:rpm/suse/python-nltk&distro=SUSE%20Package%20Hub%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.7-bp156.4.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"python3-nltk":"3.7-bp156.4.3.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"python-nltk","purl":"pkg:rpm/opensuse/python-nltk&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.7-bp156.4.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for python-nltk fixes the following issues:\n\n- CVE-2024-39705: Fixed remote code execution through unsafe pickle usage (boo#1227174).\n","id":"openSUSE-SU-2024:0221-1","modified":"2024-07-26T10:32:35Z","published":"2024-07-26T10:32:35Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TPL3SFAM7D6T4BAZ4QKZPZDK5JXBAFFC/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227174"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39705"}],"related":["CVE-2024-39705"],"summary":"Security update for python-nltk","upstream":["CVE-2024-39705"]}