SUSE-SU-2026:1345-1

Vulnerability from csaf_suse - Published: 2026-04-15 12:04 - Updated: 2026-04-15 12:04
Summary
Security update for python36
Severity
Important
Notes
Title of the patch: Security update for python36
Description of the patch: This update for python36 fixes the following issues: - CVE-2025-13462: incorrect parsing of TarInfo header when GNU long name and type AREGTYPE are combined (bsc#1259611). - CVE-2026-3479: python: improper resource argument validation can allow path traversal (bsc#1259989). - CVE-2026-3644: incomplete control character validation in http.cookies (bsc#1259734). - CVE-2026-4224: C stack overflow when parsing XML with deeply nested DTD content models (bsc#1259735). - CVE-2026-4519: leading dashes in URLs are accepted by the `webbrowser.open()` API and allow for web browser command line option injection (bsc#1260026).
Patchnames: SUSE-2026-1345,SUSE-SLE-SERVER-12-SP5-LTSS-2026-1345,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-1345
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for python36",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for python36 fixes the following issues:\n\n- CVE-2025-13462: incorrect parsing of TarInfo header when GNU long name and type AREGTYPE are combined (bsc#1259611).\n- CVE-2026-3479: python: improper resource argument validation can allow path traversal (bsc#1259989).\n- CVE-2026-3644: incomplete control character validation in http.cookies (bsc#1259734).\n- CVE-2026-4224: C stack overflow when parsing XML with deeply nested DTD content models (bsc#1259735).\n- CVE-2026-4519: leading dashes in URLs are accepted by the `webbrowser.open()` API and allow for web browser command line option injection (bsc#1260026).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2026-1345,SUSE-SLE-SERVER-12-SP5-LTSS-2026-1345,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-1345",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1345-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2026:1345-1",
        "url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261345-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2026:1345-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045570.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1259611",
        "url": "https://bugzilla.suse.com/1259611"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1259734",
        "url": "https://bugzilla.suse.com/1259734"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1259735",
        "url": "https://bugzilla.suse.com/1259735"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1259989",
        "url": "https://bugzilla.suse.com/1259989"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1260026",
        "url": "https://bugzilla.suse.com/1260026"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-13462 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-13462/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-3479 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-3479/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-3644 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-3644/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-4224 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-4224/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-4519 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-4519/"
      }
    ],
    "title": "Security update for python36",
    "tracking": {
      "current_release_date": "2026-04-15T12:04:26Z",
      "generator": {
        "date": "2026-04-15T12:04:26Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2026:1345-1",
      "initial_release_date": "2026-04-15T12:04:26Z",
      "revision_history": [
        {
          "date": "2026-04-15T12:04:26Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpython3_6m1_0-3.6.15-108.1.aarch64",
                "product": {
                  "name": "libpython3_6m1_0-3.6.15-108.1.aarch64",
                  "product_id": "libpython3_6m1_0-3.6.15-108.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-3.6.15-108.1.aarch64",
                "product": {
                  "name": "python36-3.6.15-108.1.aarch64",
                  "product_id": "python36-3.6.15-108.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-base-3.6.15-108.1.aarch64",
                "product": {
                  "name": "python36-base-3.6.15-108.1.aarch64",
                  "product_id": "python36-base-3.6.15-108.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-curses-3.6.15-108.1.aarch64",
                "product": {
                  "name": "python36-curses-3.6.15-108.1.aarch64",
                  "product_id": "python36-curses-3.6.15-108.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-dbm-3.6.15-108.1.aarch64",
                "product": {
                  "name": "python36-dbm-3.6.15-108.1.aarch64",
                  "product_id": "python36-dbm-3.6.15-108.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-devel-3.6.15-108.1.aarch64",
                "product": {
                  "name": "python36-devel-3.6.15-108.1.aarch64",
                  "product_id": "python36-devel-3.6.15-108.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-idle-3.6.15-108.1.aarch64",
                "product": {
                  "name": "python36-idle-3.6.15-108.1.aarch64",
                  "product_id": "python36-idle-3.6.15-108.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-testsuite-3.6.15-108.1.aarch64",
                "product": {
                  "name": "python36-testsuite-3.6.15-108.1.aarch64",
                  "product_id": "python36-testsuite-3.6.15-108.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-tk-3.6.15-108.1.aarch64",
                "product": {
                  "name": "python36-tk-3.6.15-108.1.aarch64",
                  "product_id": "python36-tk-3.6.15-108.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-tools-3.6.15-108.1.aarch64",
                "product": {
                  "name": "python36-tools-3.6.15-108.1.aarch64",
                  "product_id": "python36-tools-3.6.15-108.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpython3_6m1_0-64bit-3.6.15-108.1.aarch64_ilp32",
                "product": {
                  "name": "libpython3_6m1_0-64bit-3.6.15-108.1.aarch64_ilp32",
                  "product_id": "libpython3_6m1_0-64bit-3.6.15-108.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "python36-64bit-3.6.15-108.1.aarch64_ilp32",
                "product": {
                  "name": "python36-64bit-3.6.15-108.1.aarch64_ilp32",
                  "product_id": "python36-64bit-3.6.15-108.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "python36-base-64bit-3.6.15-108.1.aarch64_ilp32",
                "product": {
                  "name": "python36-base-64bit-3.6.15-108.1.aarch64_ilp32",
                  "product_id": "python36-base-64bit-3.6.15-108.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpython3_6m1_0-3.6.15-108.1.i586",
                "product": {
                  "name": "libpython3_6m1_0-3.6.15-108.1.i586",
                  "product_id": "libpython3_6m1_0-3.6.15-108.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "python36-3.6.15-108.1.i586",
                "product": {
                  "name": "python36-3.6.15-108.1.i586",
                  "product_id": "python36-3.6.15-108.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "python36-base-3.6.15-108.1.i586",
                "product": {
                  "name": "python36-base-3.6.15-108.1.i586",
                  "product_id": "python36-base-3.6.15-108.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "python36-curses-3.6.15-108.1.i586",
                "product": {
                  "name": "python36-curses-3.6.15-108.1.i586",
                  "product_id": "python36-curses-3.6.15-108.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "python36-dbm-3.6.15-108.1.i586",
                "product": {
                  "name": "python36-dbm-3.6.15-108.1.i586",
                  "product_id": "python36-dbm-3.6.15-108.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "python36-devel-3.6.15-108.1.i586",
                "product": {
                  "name": "python36-devel-3.6.15-108.1.i586",
                  "product_id": "python36-devel-3.6.15-108.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "python36-idle-3.6.15-108.1.i586",
                "product": {
                  "name": "python36-idle-3.6.15-108.1.i586",
                  "product_id": "python36-idle-3.6.15-108.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "python36-testsuite-3.6.15-108.1.i586",
                "product": {
                  "name": "python36-testsuite-3.6.15-108.1.i586",
                  "product_id": "python36-testsuite-3.6.15-108.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "python36-tk-3.6.15-108.1.i586",
                "product": {
                  "name": "python36-tk-3.6.15-108.1.i586",
                  "product_id": "python36-tk-3.6.15-108.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "python36-tools-3.6.15-108.1.i586",
                "product": {
                  "name": "python36-tools-3.6.15-108.1.i586",
                  "product_id": "python36-tools-3.6.15-108.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpython3_6m1_0-3.6.15-108.1.ppc64le",
                "product": {
                  "name": "libpython3_6m1_0-3.6.15-108.1.ppc64le",
                  "product_id": "libpython3_6m1_0-3.6.15-108.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "python36-3.6.15-108.1.ppc64le",
                "product": {
                  "name": "python36-3.6.15-108.1.ppc64le",
                  "product_id": "python36-3.6.15-108.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "python36-base-3.6.15-108.1.ppc64le",
                "product": {
                  "name": "python36-base-3.6.15-108.1.ppc64le",
                  "product_id": "python36-base-3.6.15-108.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "python36-curses-3.6.15-108.1.ppc64le",
                "product": {
                  "name": "python36-curses-3.6.15-108.1.ppc64le",
                  "product_id": "python36-curses-3.6.15-108.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "python36-dbm-3.6.15-108.1.ppc64le",
                "product": {
                  "name": "python36-dbm-3.6.15-108.1.ppc64le",
                  "product_id": "python36-dbm-3.6.15-108.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "python36-devel-3.6.15-108.1.ppc64le",
                "product": {
                  "name": "python36-devel-3.6.15-108.1.ppc64le",
                  "product_id": "python36-devel-3.6.15-108.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "python36-idle-3.6.15-108.1.ppc64le",
                "product": {
                  "name": "python36-idle-3.6.15-108.1.ppc64le",
                  "product_id": "python36-idle-3.6.15-108.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "python36-testsuite-3.6.15-108.1.ppc64le",
                "product": {
                  "name": "python36-testsuite-3.6.15-108.1.ppc64le",
                  "product_id": "python36-testsuite-3.6.15-108.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "python36-tk-3.6.15-108.1.ppc64le",
                "product": {
                  "name": "python36-tk-3.6.15-108.1.ppc64le",
                  "product_id": "python36-tk-3.6.15-108.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "python36-tools-3.6.15-108.1.ppc64le",
                "product": {
                  "name": "python36-tools-3.6.15-108.1.ppc64le",
                  "product_id": "python36-tools-3.6.15-108.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpython3_6m1_0-3.6.15-108.1.s390",
                "product": {
                  "name": "libpython3_6m1_0-3.6.15-108.1.s390",
                  "product_id": "libpython3_6m1_0-3.6.15-108.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "python36-3.6.15-108.1.s390",
                "product": {
                  "name": "python36-3.6.15-108.1.s390",
                  "product_id": "python36-3.6.15-108.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "python36-base-3.6.15-108.1.s390",
                "product": {
                  "name": "python36-base-3.6.15-108.1.s390",
                  "product_id": "python36-base-3.6.15-108.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "python36-curses-3.6.15-108.1.s390",
                "product": {
                  "name": "python36-curses-3.6.15-108.1.s390",
                  "product_id": "python36-curses-3.6.15-108.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "python36-dbm-3.6.15-108.1.s390",
                "product": {
                  "name": "python36-dbm-3.6.15-108.1.s390",
                  "product_id": "python36-dbm-3.6.15-108.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "python36-devel-3.6.15-108.1.s390",
                "product": {
                  "name": "python36-devel-3.6.15-108.1.s390",
                  "product_id": "python36-devel-3.6.15-108.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "python36-idle-3.6.15-108.1.s390",
                "product": {
                  "name": "python36-idle-3.6.15-108.1.s390",
                  "product_id": "python36-idle-3.6.15-108.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "python36-testsuite-3.6.15-108.1.s390",
                "product": {
                  "name": "python36-testsuite-3.6.15-108.1.s390",
                  "product_id": "python36-testsuite-3.6.15-108.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "python36-tk-3.6.15-108.1.s390",
                "product": {
                  "name": "python36-tk-3.6.15-108.1.s390",
                  "product_id": "python36-tk-3.6.15-108.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "python36-tools-3.6.15-108.1.s390",
                "product": {
                  "name": "python36-tools-3.6.15-108.1.s390",
                  "product_id": "python36-tools-3.6.15-108.1.s390"
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpython3_6m1_0-3.6.15-108.1.s390x",
                "product": {
                  "name": "libpython3_6m1_0-3.6.15-108.1.s390x",
                  "product_id": "libpython3_6m1_0-3.6.15-108.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libpython3_6m1_0-32bit-3.6.15-108.1.s390x",
                "product": {
                  "name": "libpython3_6m1_0-32bit-3.6.15-108.1.s390x",
                  "product_id": "libpython3_6m1_0-32bit-3.6.15-108.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python36-3.6.15-108.1.s390x",
                "product": {
                  "name": "python36-3.6.15-108.1.s390x",
                  "product_id": "python36-3.6.15-108.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python36-32bit-3.6.15-108.1.s390x",
                "product": {
                  "name": "python36-32bit-3.6.15-108.1.s390x",
                  "product_id": "python36-32bit-3.6.15-108.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python36-base-3.6.15-108.1.s390x",
                "product": {
                  "name": "python36-base-3.6.15-108.1.s390x",
                  "product_id": "python36-base-3.6.15-108.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python36-base-32bit-3.6.15-108.1.s390x",
                "product": {
                  "name": "python36-base-32bit-3.6.15-108.1.s390x",
                  "product_id": "python36-base-32bit-3.6.15-108.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python36-curses-3.6.15-108.1.s390x",
                "product": {
                  "name": "python36-curses-3.6.15-108.1.s390x",
                  "product_id": "python36-curses-3.6.15-108.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python36-dbm-3.6.15-108.1.s390x",
                "product": {
                  "name": "python36-dbm-3.6.15-108.1.s390x",
                  "product_id": "python36-dbm-3.6.15-108.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python36-devel-3.6.15-108.1.s390x",
                "product": {
                  "name": "python36-devel-3.6.15-108.1.s390x",
                  "product_id": "python36-devel-3.6.15-108.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python36-idle-3.6.15-108.1.s390x",
                "product": {
                  "name": "python36-idle-3.6.15-108.1.s390x",
                  "product_id": "python36-idle-3.6.15-108.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python36-testsuite-3.6.15-108.1.s390x",
                "product": {
                  "name": "python36-testsuite-3.6.15-108.1.s390x",
                  "product_id": "python36-testsuite-3.6.15-108.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python36-tk-3.6.15-108.1.s390x",
                "product": {
                  "name": "python36-tk-3.6.15-108.1.s390x",
                  "product_id": "python36-tk-3.6.15-108.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "python36-tools-3.6.15-108.1.s390x",
                "product": {
                  "name": "python36-tools-3.6.15-108.1.s390x",
                  "product_id": "python36-tools-3.6.15-108.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpython3_6m1_0-3.6.15-108.1.x86_64",
                "product": {
                  "name": "libpython3_6m1_0-3.6.15-108.1.x86_64",
                  "product_id": "libpython3_6m1_0-3.6.15-108.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
                "product": {
                  "name": "libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
                  "product_id": "libpython3_6m1_0-32bit-3.6.15-108.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-3.6.15-108.1.x86_64",
                "product": {
                  "name": "python36-3.6.15-108.1.x86_64",
                  "product_id": "python36-3.6.15-108.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-32bit-3.6.15-108.1.x86_64",
                "product": {
                  "name": "python36-32bit-3.6.15-108.1.x86_64",
                  "product_id": "python36-32bit-3.6.15-108.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-base-3.6.15-108.1.x86_64",
                "product": {
                  "name": "python36-base-3.6.15-108.1.x86_64",
                  "product_id": "python36-base-3.6.15-108.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-base-32bit-3.6.15-108.1.x86_64",
                "product": {
                  "name": "python36-base-32bit-3.6.15-108.1.x86_64",
                  "product_id": "python36-base-32bit-3.6.15-108.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-curses-3.6.15-108.1.x86_64",
                "product": {
                  "name": "python36-curses-3.6.15-108.1.x86_64",
                  "product_id": "python36-curses-3.6.15-108.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-dbm-3.6.15-108.1.x86_64",
                "product": {
                  "name": "python36-dbm-3.6.15-108.1.x86_64",
                  "product_id": "python36-dbm-3.6.15-108.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-devel-3.6.15-108.1.x86_64",
                "product": {
                  "name": "python36-devel-3.6.15-108.1.x86_64",
                  "product_id": "python36-devel-3.6.15-108.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-idle-3.6.15-108.1.x86_64",
                "product": {
                  "name": "python36-idle-3.6.15-108.1.x86_64",
                  "product_id": "python36-idle-3.6.15-108.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-testsuite-3.6.15-108.1.x86_64",
                "product": {
                  "name": "python36-testsuite-3.6.15-108.1.x86_64",
                  "product_id": "python36-testsuite-3.6.15-108.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-tk-3.6.15-108.1.x86_64",
                "product": {
                  "name": "python36-tk-3.6.15-108.1.x86_64",
                  "product_id": "python36-tk-3.6.15-108.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python36-tools-3.6.15-108.1.x86_64",
                "product": {
                  "name": "python36-tools-3.6.15-108.1.x86_64",
                  "product_id": "python36-tools-3.6.15-108.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpython3_6m1_0-3.6.15-108.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.aarch64"
        },
        "product_reference": "libpython3_6m1_0-3.6.15-108.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpython3_6m1_0-3.6.15-108.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.ppc64le"
        },
        "product_reference": "libpython3_6m1_0-3.6.15-108.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpython3_6m1_0-3.6.15-108.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.s390x"
        },
        "product_reference": "libpython3_6m1_0-3.6.15-108.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpython3_6m1_0-3.6.15-108.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.x86_64"
        },
        "product_reference": "libpython3_6m1_0-3.6.15-108.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpython3_6m1_0-32bit-3.6.15-108.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.s390x"
        },
        "product_reference": "libpython3_6m1_0-32bit-3.6.15-108.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpython3_6m1_0-32bit-3.6.15-108.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64"
        },
        "product_reference": "libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python36-3.6.15-108.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.aarch64"
        },
        "product_reference": "python36-3.6.15-108.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python36-3.6.15-108.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.ppc64le"
        },
        "product_reference": "python36-3.6.15-108.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python36-3.6.15-108.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.s390x"
        },
        "product_reference": "python36-3.6.15-108.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python36-3.6.15-108.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.x86_64"
        },
        "product_reference": "python36-3.6.15-108.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python36-base-3.6.15-108.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.aarch64"
        },
        "product_reference": "python36-base-3.6.15-108.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python36-base-3.6.15-108.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.ppc64le"
        },
        "product_reference": "python36-base-3.6.15-108.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python36-base-3.6.15-108.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.s390x"
        },
        "product_reference": "python36-base-3.6.15-108.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python36-base-3.6.15-108.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.x86_64"
        },
        "product_reference": "python36-base-3.6.15-108.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python36-devel-3.6.15-108.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.aarch64"
        },
        "product_reference": "python36-devel-3.6.15-108.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python36-devel-3.6.15-108.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.ppc64le"
        },
        "product_reference": "python36-devel-3.6.15-108.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python36-devel-3.6.15-108.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.s390x"
        },
        "product_reference": "python36-devel-3.6.15-108.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python36-devel-3.6.15-108.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.x86_64"
        },
        "product_reference": "python36-devel-3.6.15-108.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpython3_6m1_0-3.6.15-108.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-3.6.15-108.1.x86_64"
        },
        "product_reference": "libpython3_6m1_0-3.6.15-108.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpython3_6m1_0-32bit-3.6.15-108.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64"
        },
        "product_reference": "libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python36-3.6.15-108.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-3.6.15-108.1.x86_64"
        },
        "product_reference": "python36-3.6.15-108.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python36-base-3.6.15-108.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-base-3.6.15-108.1.x86_64"
        },
        "product_reference": "python36-base-3.6.15-108.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python36-devel-3.6.15-108.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-devel-3.6.15-108.1.x86_64"
        },
        "product_reference": "python36-devel-3.6.15-108.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-13462",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-13462"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The \"tarfile\" module would still apply normalization of AREGTYPE (\\x00) blocks to DIRTYPE, even while processing a multi-block member such as GNUTYPE_LONGNAME or GNUTYPE_LONGLINK. This could result in a crafted tar archive being misinterpreted by the tarfile module compared to other implementations.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-base-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-devel-3.6.15-108.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-13462",
          "url": "https://www.suse.com/security/cve/CVE-2025-13462"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1259611 for CVE-2025-13462",
          "url": "https://bugzilla.suse.com/1259611"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-devel-3.6.15-108.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-devel-3.6.15-108.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-04-15T12:04:26Z",
          "details": "low"
        }
      ],
      "title": "CVE-2025-13462"
    },
    {
      "cve": "CVE-2026-3479",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-3479"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "DISPUTED: The project has clarified that the documentation was incorrect, and that pkgutil.get_data() has the same security model as open(). The documentation has been updated to clarify this point. There is no vulnerability in the function if following the intended security model.\n\npkgutil.get_data() did not validate the resource argument as documented, allowing path traversals.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-base-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-devel-3.6.15-108.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-3479",
          "url": "https://www.suse.com/security/cve/CVE-2026-3479"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1259989 for CVE-2026-3479",
          "url": "https://bugzilla.suse.com/1259989"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-devel-3.6.15-108.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-devel-3.6.15-108.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-04-15T12:04:26Z",
          "details": "low"
        }
      ],
      "title": "CVE-2026-3479"
    },
    {
      "cve": "CVE-2026-3644",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-3644"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-base-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-devel-3.6.15-108.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-3644",
          "url": "https://www.suse.com/security/cve/CVE-2026-3644"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1259734 for CVE-2026-3644",
          "url": "https://bugzilla.suse.com/1259734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-devel-3.6.15-108.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-devel-3.6.15-108.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-04-15T12:04:26Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-3644"
    },
    {
      "cve": "CVE-2026-4224",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-4224"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "When an Expat parser with a registered ElementDeclHandler parses an inline\ndocument type definition containing a deeply nested content model a C stack\noverflow occurs.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-base-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-devel-3.6.15-108.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-4224",
          "url": "https://www.suse.com/security/cve/CVE-2026-4224"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1259735 for CVE-2026-4224",
          "url": "https://bugzilla.suse.com/1259735"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-devel-3.6.15-108.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-devel-3.6.15-108.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-04-15T12:04:26Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-4224"
    },
    {
      "cve": "CVE-2026-4519",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-4519"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The webbrowser.open() API would accept leading dashes in the URL which \ncould be handled as command line options for certain web browsers. New \nbehavior rejects leading dashes. Users are recommended to sanitize URLs \nprior to passing to webbrowser.open().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-base-3.6.15-108.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-devel-3.6.15-108.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-4519",
          "url": "https://www.suse.com/security/cve/CVE-2026-4519"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1260026 for CVE-2026-4519",
          "url": "https://bugzilla.suse.com/1260026"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-devel-3.6.15-108.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:python36-devel-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpython3_6m1_0-32bit-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-base-3.6.15-108.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python36-devel-3.6.15-108.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-04-15T12:04:26Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-4519"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…