Security update for python36
| Announcement ID: | SUSE-SU-2026:0612-1 |
|---|---|
| Release Date: | 2026-02-24T15:14:24Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves six vulnerabilities can now be installed.
Description:
This update for python36 fixes the following issues:
- CVE-2025-11468: header injection when folding a long comment in an email header containing exclusively unfoldable characters (bsc#1257029).
- CVE-2026-0672: HTTP header injection via user-controlled cookie values and parameters when using http.cookies.Morsel (bsc#1257031).
- CVE-2026-0865: user-controlled header containing newlines can allow injecting HTTP headers (bsc#1257042).
- CVE-2025-15366: user-controlled command can allow additional commands injected using newlines (bsc#1257044).
- CVE-2025-15282: user-controlled data URLs parsed may allow injecting headers (bsc#1257046).
- CVE-2025-15367: control characters may allow the injection of additional commands (bsc#1257041).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-612=1 -
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-612=1
Package List:
-
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
- libpython3_6m1_0-debuginfo-3.6.15-100.1
- python36-3.6.15-100.1
- python36-debugsource-3.6.15-100.1
- python36-debuginfo-3.6.15-100.1
- python36-base-3.6.15-100.1
- python36-base-debuginfo-3.6.15-100.1
- python36-devel-3.6.15-100.1
- libpython3_6m1_0-3.6.15-100.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64)
- libpython3_6m1_0-debuginfo-32bit-3.6.15-100.1
- libpython3_6m1_0-32bit-3.6.15-100.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
- libpython3_6m1_0-debuginfo-3.6.15-100.1
- libpython3_6m1_0-debuginfo-32bit-3.6.15-100.1
- python36-3.6.15-100.1
- python36-debugsource-3.6.15-100.1
- python36-debuginfo-3.6.15-100.1
- libpython3_6m1_0-32bit-3.6.15-100.1
- python36-base-3.6.15-100.1
- python36-base-debuginfo-3.6.15-100.1
- python36-devel-3.6.15-100.1
- libpython3_6m1_0-3.6.15-100.1
References:
- https://www.suse.com/security/cve/CVE-2025-11468.html
- https://www.suse.com/security/cve/CVE-2025-15282.html
- https://www.suse.com/security/cve/CVE-2025-15366.html
- https://www.suse.com/security/cve/CVE-2025-15367.html
- https://www.suse.com/security/cve/CVE-2026-0672.html
- https://www.suse.com/security/cve/CVE-2026-0865.html
- https://bugzilla.suse.com/show_bug.cgi?id=1257029
- https://bugzilla.suse.com/show_bug.cgi?id=1257031
- https://bugzilla.suse.com/show_bug.cgi?id=1257041
- https://bugzilla.suse.com/show_bug.cgi?id=1257042
- https://bugzilla.suse.com/show_bug.cgi?id=1257044
- https://bugzilla.suse.com/show_bug.cgi?id=1257046