SUSE-SU-2026:21254-1
Vulnerability from csaf_suse - Published: 2026-04-16 13:30 - Updated: 2026-04-16 13:30Summary
Security update for python311
Severity
Important
Notes
Title of the patch: Security update for python311
Description of the patch: This update for python311 fixes the following issues:
- CVE-2025-13462: incorrect parsing of TarInfo when GNU long name and type AREGTYPE are combined can lead to
misinterpretation of tar archives (bsc#1259611).
- CVE-2026-3479: improper resource argument validation in `pkgutil.get_data()` can lead to path traversal (bsc#1259989).
- CVE-2026-3644: incomplete control character validation in http.cookies can lead to input validation bypass
(bsc#1259734).
- CVE-2026-4224: parsing XML with deeply nested DTD content models can lead to C stack overflow (bsc#1259735).
- CVE-2026-4519: failure to sanitize leading dashes in URLs in the `webbrowser.open()` API can lead to web browser
command line option injection (bsc#1260026).
Patchnames: SUSE-SLE-Micro-6.1-490
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python311",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python311 fixes the following issues:\n\n- CVE-2025-13462: incorrect parsing of TarInfo when GNU long name and type AREGTYPE are combined can lead to\n misinterpretation of tar archives (bsc#1259611).\n- CVE-2026-3479: improper resource argument validation in `pkgutil.get_data()` can lead to path traversal (bsc#1259989).\n- CVE-2026-3644: incomplete control character validation in http.cookies can lead to input validation bypass\n (bsc#1259734).\n- CVE-2026-4224: parsing XML with deeply nested DTD content models can lead to C stack overflow (bsc#1259735).\n- CVE-2026-4519: failure to sanitize leading dashes in URLs in the `webbrowser.open()` API can lead to web browser\n command line option injection (bsc#1260026).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-490",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21254-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:21254-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621254-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:21254-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045897.html"
},
{
"category": "self",
"summary": "SUSE Bug 1259611",
"url": "https://bugzilla.suse.com/1259611"
},
{
"category": "self",
"summary": "SUSE Bug 1259734",
"url": "https://bugzilla.suse.com/1259734"
},
{
"category": "self",
"summary": "SUSE Bug 1259735",
"url": "https://bugzilla.suse.com/1259735"
},
{
"category": "self",
"summary": "SUSE Bug 1259989",
"url": "https://bugzilla.suse.com/1259989"
},
{
"category": "self",
"summary": "SUSE Bug 1260026",
"url": "https://bugzilla.suse.com/1260026"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13462 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13462/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-3479 page",
"url": "https://www.suse.com/security/cve/CVE-2026-3479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-3644 page",
"url": "https://www.suse.com/security/cve/CVE-2026-3644/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-4224 page",
"url": "https://www.suse.com/security/cve/CVE-2026-4224/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-4519 page",
"url": "https://www.suse.com/security/cve/CVE-2026-4519/"
}
],
"title": "Security update for python311",
"tracking": {
"current_release_date": "2026-04-16T13:30:07Z",
"generator": {
"date": "2026-04-16T13:30:07Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:21254-1",
"initial_release_date": "2026-04-16T13:30:07Z",
"revision_history": [
{
"date": "2026-04-16T13:30:07Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64",
"product": {
"name": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64",
"product_id": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-3.11.15-slfo.1.1_3.1.aarch64",
"product": {
"name": "python311-3.11.15-slfo.1.1_3.1.aarch64",
"product_id": "python311-3.11.15-slfo.1.1_3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.15-slfo.1.1_3.1.aarch64",
"product": {
"name": "python311-base-3.11.15-slfo.1.1_3.1.aarch64",
"product_id": "python311-base-3.11.15-slfo.1.1_3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.15-slfo.1.1_3.1.aarch64",
"product": {
"name": "python311-curses-3.11.15-slfo.1.1_3.1.aarch64",
"product_id": "python311-curses-3.11.15-slfo.1.1_3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le",
"product": {
"name": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le",
"product_id": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-3.11.15-slfo.1.1_3.1.ppc64le",
"product": {
"name": "python311-3.11.15-slfo.1.1_3.1.ppc64le",
"product_id": "python311-3.11.15-slfo.1.1_3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.15-slfo.1.1_3.1.ppc64le",
"product": {
"name": "python311-base-3.11.15-slfo.1.1_3.1.ppc64le",
"product_id": "python311-base-3.11.15-slfo.1.1_3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.15-slfo.1.1_3.1.ppc64le",
"product": {
"name": "python311-curses-3.11.15-slfo.1.1_3.1.ppc64le",
"product_id": "python311-curses-3.11.15-slfo.1.1_3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x",
"product": {
"name": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x",
"product_id": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-3.11.15-slfo.1.1_3.1.s390x",
"product": {
"name": "python311-3.11.15-slfo.1.1_3.1.s390x",
"product_id": "python311-3.11.15-slfo.1.1_3.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.15-slfo.1.1_3.1.s390x",
"product": {
"name": "python311-base-3.11.15-slfo.1.1_3.1.s390x",
"product_id": "python311-base-3.11.15-slfo.1.1_3.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.15-slfo.1.1_3.1.s390x",
"product": {
"name": "python311-curses-3.11.15-slfo.1.1_3.1.s390x",
"product_id": "python311-curses-3.11.15-slfo.1.1_3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64",
"product": {
"name": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64",
"product_id": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-3.11.15-slfo.1.1_3.1.x86_64",
"product": {
"name": "python311-3.11.15-slfo.1.1_3.1.x86_64",
"product_id": "python311-3.11.15-slfo.1.1_3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.15-slfo.1.1_3.1.x86_64",
"product": {
"name": "python311-base-3.11.15-slfo.1.1_3.1.x86_64",
"product_id": "python311-base-3.11.15-slfo.1.1_3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.15-slfo.1.1_3.1.x86_64",
"product": {
"name": "python311-curses-3.11.15-slfo.1.1_3.1.x86_64",
"product_id": "python311-curses-3.11.15-slfo.1.1_3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64"
},
"product_reference": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le"
},
"product_reference": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x"
},
"product_reference": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64"
},
"product_reference": "libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.15-slfo.1.1_3.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.aarch64"
},
"product_reference": "python311-3.11.15-slfo.1.1_3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.15-slfo.1.1_3.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.ppc64le"
},
"product_reference": "python311-3.11.15-slfo.1.1_3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.15-slfo.1.1_3.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.s390x"
},
"product_reference": "python311-3.11.15-slfo.1.1_3.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.15-slfo.1.1_3.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.x86_64"
},
"product_reference": "python311-3.11.15-slfo.1.1_3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.15-slfo.1.1_3.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.aarch64"
},
"product_reference": "python311-base-3.11.15-slfo.1.1_3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.15-slfo.1.1_3.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.ppc64le"
},
"product_reference": "python311-base-3.11.15-slfo.1.1_3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.15-slfo.1.1_3.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.s390x"
},
"product_reference": "python311-base-3.11.15-slfo.1.1_3.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.15-slfo.1.1_3.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.x86_64"
},
"product_reference": "python311-base-3.11.15-slfo.1.1_3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.15-slfo.1.1_3.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.aarch64"
},
"product_reference": "python311-curses-3.11.15-slfo.1.1_3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.15-slfo.1.1_3.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.ppc64le"
},
"product_reference": "python311-curses-3.11.15-slfo.1.1_3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.15-slfo.1.1_3.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.s390x"
},
"product_reference": "python311-curses-3.11.15-slfo.1.1_3.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.15-slfo.1.1_3.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.x86_64"
},
"product_reference": "python311-curses-3.11.15-slfo.1.1_3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13462",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13462"
}
],
"notes": [
{
"category": "general",
"text": "The \"tarfile\" module would still apply normalization of AREGTYPE (\\x00) blocks to DIRTYPE, even while processing a multi-block member such as GNUTYPE_LONGNAME or GNUTYPE_LONGLINK. This could result in a crafted tar archive being misinterpreted by the tarfile module compared to other implementations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13462",
"url": "https://www.suse.com/security/cve/CVE-2025-13462"
},
{
"category": "external",
"summary": "SUSE Bug 1259611 for CVE-2025-13462",
"url": "https://bugzilla.suse.com/1259611"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-16T13:30:07Z",
"details": "low"
}
],
"title": "CVE-2025-13462"
},
{
"cve": "CVE-2026-3479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-3479"
}
],
"notes": [
{
"category": "general",
"text": "DISPUTED: The project has clarified that the documentation was incorrect, and that pkgutil.get_data() has the same security model as open(). The documentation has been updated to clarify this point. There is no vulnerability in the function if following the intended security model.\n\npkgutil.get_data() did not validate the resource argument as documented, allowing path traversals.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-3479",
"url": "https://www.suse.com/security/cve/CVE-2026-3479"
},
{
"category": "external",
"summary": "SUSE Bug 1259989 for CVE-2026-3479",
"url": "https://bugzilla.suse.com/1259989"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-16T13:30:07Z",
"details": "low"
}
],
"title": "CVE-2026-3479"
},
{
"cve": "CVE-2026-3644",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-3644"
}
],
"notes": [
{
"category": "general",
"text": "The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-3644",
"url": "https://www.suse.com/security/cve/CVE-2026-3644"
},
{
"category": "external",
"summary": "SUSE Bug 1259734 for CVE-2026-3644",
"url": "https://bugzilla.suse.com/1259734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-16T13:30:07Z",
"details": "moderate"
}
],
"title": "CVE-2026-3644"
},
{
"cve": "CVE-2026-4224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-4224"
}
],
"notes": [
{
"category": "general",
"text": "When an Expat parser with a registered ElementDeclHandler parses an inline\ndocument type definition containing a deeply nested content model a C stack\noverflow occurs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-4224",
"url": "https://www.suse.com/security/cve/CVE-2026-4224"
},
{
"category": "external",
"summary": "SUSE Bug 1259735 for CVE-2026-4224",
"url": "https://bugzilla.suse.com/1259735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-16T13:30:07Z",
"details": "important"
}
],
"title": "CVE-2026-4224"
},
{
"cve": "CVE-2026-4519",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-4519"
}
],
"notes": [
{
"category": "general",
"text": "The webbrowser.open() API would accept leading dashes in the URL which \ncould be handled as command line options for certain web browsers. New \nbehavior rejects leading dashes. Users are recommended to sanitize URLs \nprior to passing to webbrowser.open().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-4519",
"url": "https://www.suse.com/security/cve/CVE-2026-4519"
},
{
"category": "external",
"summary": "SUSE Bug 1260026 for CVE-2026-4519",
"url": "https://bugzilla.suse.com/1260026"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.15-slfo.1.1_3.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.15-slfo.1.1_3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-16T13:30:07Z",
"details": "moderate"
}
],
"title": "CVE-2026-4519"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…