Upstream information
Description
The "profiling.sampling" module (Python 3.15+) and "asyncio introspection capabilities" (3.14+, "python -m asyncio ps" and "python -m asyncio pstree") features could be used to read and write addresses in a privileged process if that process connected to a malicious or "infected" Python process via the remote debugging feature. This vulnerability requires persistently and repeatedly connecting to the process to be exploited, even after the connecting process crashes with high likelihood due to ASLR.SUSE information
Overall state of this security issue: Does not affect SUSE products
SUSE Bugzilla entry: 1262132 [NEW] No SUSE Security Announcements cross referenced.List of released packages
| Product(s) | Fixed package version(s) | References |
|---|---|---|
| openSUSE Tumbleweed |
| Patchnames: openSUSE-Tumbleweed-2026-10648 |
SUSE Timeline for this CVE
CVE page created: Tue Apr 14 18:30:39 2026CVE page last modified: Fri May 8 11:28:02 2026