Upstream information

CVE-2026-5713 at MITRE

Description

The "profiling.sampling" module (Python 3.15+) and "asyncio introspection capabilities" (3.14+, "python -m asyncio ps" and "python -m asyncio pstree") features could be used to read and write addresses in a privileged process if that process connected to a malicious or "infected" Python process via the remote debugging feature. This vulnerability requires persistently and repeatedly connecting to the process to be exploited, even after the connecting process crashes with high likelihood due to ASLR.

SUSE information

Overall state of this security issue: Does not affect SUSE products

SUSE Bugzilla entry: 1262132 [NEW]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • python315 >= 3.15.0~a8-3.1
  • python315-curses >= 3.15.0~a8-3.1
  • python315-dbm >= 3.15.0~a8-3.1
  • python315-idle >= 3.15.0~a8-3.1
  • python315-profiling >= 3.15.0~a8-3.1
  • python315-tk >= 3.15.0~a8-3.1
  • python315-x86-64-v3 >= 3.15.0~a8-3.1
Patchnames:
openSUSE-Tumbleweed-2026-10648


SUSE Timeline for this CVE

CVE page created: Tue Apr 14 18:30:39 2026
CVE page last modified: Fri May 8 11:28:02 2026