Security update for python3
| Announcement ID: | SUSE-SU-2026:1937-1 |
|---|---|
| Release Date: | 2026-05-18T07:42:02Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves five vulnerabilities can now be installed.
Description:
This update for python3 fixes the following issue:
- CVE-2026-1502: HTTP client proxy tunnel headers not validated for CR/LF (bsc#1261969).
- CVE-2026-3446: base64 decoding stops at first padded quad by default and ignores other information that could be processed (bsc#1261970).
- CVE-2026-4786: URLs prefixed with
%actioncan pass the dash-prefix safety check and allow for command injection (bsc#1262319). - CVE-2026-6019:
BaseCookie.js_output()does not neutralize characters in cookie values embedded in JS (bsc#1262654). - CVE-2026-6100: use-after-free in
lzma.LZMADecompressor,bz2.BZ2Decompressor, andgzip.GzipFilewhen process is under memory pressure(bsc#1262098).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-1937=1 -
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-1937=1
Package List:
-
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
- python3-devel-3.4.10-25.185.1
- python3-base-3.4.10-25.185.1
- python3-tk-debuginfo-3.4.10-25.185.1
- python3-3.4.10-25.185.1
- python3-curses-3.4.10-25.185.1
- python3-curses-debuginfo-3.4.10-25.185.1
- python3-debuginfo-3.4.10-25.185.1
- python3-tk-3.4.10-25.185.1
- libpython3_4m1_0-3.4.10-25.185.1
- python3-debugsource-3.4.10-25.185.1
- python3-base-debugsource-3.4.10-25.185.1
- libpython3_4m1_0-debuginfo-3.4.10-25.185.1
- python3-base-debuginfo-3.4.10-25.185.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (ppc64le s390x x86_64)
- python3-devel-debuginfo-3.4.10-25.185.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64)
- libpython3_4m1_0-debuginfo-32bit-3.4.10-25.185.1
- libpython3_4m1_0-32bit-3.4.10-25.185.1
- python3-base-debuginfo-32bit-3.4.10-25.185.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
- libpython3_4m1_0-32bit-3.4.10-25.185.1
- python3-devel-3.4.10-25.185.1
- python3-base-3.4.10-25.185.1
- python3-tk-debuginfo-3.4.10-25.185.1
- libpython3_4m1_0-debuginfo-32bit-3.4.10-25.185.1
- python3-3.4.10-25.185.1
- python3-curses-3.4.10-25.185.1
- python3-curses-debuginfo-3.4.10-25.185.1
- python3-debuginfo-3.4.10-25.185.1
- libpython3_4m1_0-3.4.10-25.185.1
- python3-base-debuginfo-32bit-3.4.10-25.185.1
- python3-tk-3.4.10-25.185.1
- python3-devel-debuginfo-3.4.10-25.185.1
- python3-debugsource-3.4.10-25.185.1
- python3-base-debugsource-3.4.10-25.185.1
- libpython3_4m1_0-debuginfo-3.4.10-25.185.1
- python3-base-debuginfo-3.4.10-25.185.1
References:
- https://www.suse.com/security/cve/CVE-2026-1502.html
- https://www.suse.com/security/cve/CVE-2026-3446.html
- https://www.suse.com/security/cve/CVE-2026-4786.html
- https://www.suse.com/security/cve/CVE-2026-6019.html
- https://www.suse.com/security/cve/CVE-2026-6100.html
- https://bugzilla.suse.com/show_bug.cgi?id=1261969
- https://bugzilla.suse.com/show_bug.cgi?id=1261970
- https://bugzilla.suse.com/show_bug.cgi?id=1262098
- https://bugzilla.suse.com/show_bug.cgi?id=1262319
- https://bugzilla.suse.com/show_bug.cgi?id=1262654