Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-6019 (GCVE-0-2026-6019)
Vulnerability from cvelistv5 – Published: 2026-04-22 19:28 – Updated: 2026-04-29 15:31- CWE-150 - Improper neutralization of escape, meta, or control sequences
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Python Software Foundation | CPython |
Affected:
0 , < 3.15.0
(python)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-6019",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-22T20:02:17.071906Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-22T20:02:34.468Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPython",
"repo": "https://github.com/python/cpython",
"vendor": "Python Software Foundation",
"versions": [
{
"lessThan": "3.15.0",
"status": "affected",
"version": "0",
"versionType": "python"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "oolongeya (https://github.com/komi22)"
},
{
"lang": "en",
"type": "coordinator",
"value": "Seth Larson (https://github.com/sethmlarson)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003ccode\u003ehttp.cookies.Morsel.js_output()\u003c/code\u003e returns an inline \u003ccode\u003e\u0026lt;script\u0026gt;\u003c/code\u003e snippet and only escapes \u003ccode\u003e\"\u003c/code\u003e for JavaScript string context. It does not neutralize the HTML parser-sensitive sequence \u003ccode\u003e\u0026lt;/script\u0026gt;\u003c/code\u003e inside the generated script element. Mitigation base64-encodes the cookie value to disallow escaping using cookie value."
}
],
"value": "http.cookies.Morsel.js_output() returns an inline \u003cscript\u003e snippet and only escapes \" for JavaScript string context. It does not neutralize the HTML parser-sensitive sequence \u003c/script\u003e inside the generated script element. Mitigation base64-encodes the cookie value to disallow escaping using cookie value."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 2.1,
"baseSeverity": "LOW",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-150",
"description": "CWE-150 Improper neutralization of escape, meta, or control sequences",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-29T15:31:09.049Z",
"orgId": "28c92f92-d60d-412d-b760-e73465c3df22",
"shortName": "PSF"
},
"references": [
{
"tags": [
"patch"
],
"url": "https://github.com/python/cpython/pull/148848"
},
{
"tags": [
"issue-tracking"
],
"url": "https://github.com/python/cpython/issues/90309"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/IVNWGV2BBNC3RHQAFS22UP4DY56SAXX3/"
},
{
"tags": [
"patch"
],
"url": "https://github.com/python/cpython/commit/76b3923d688c0efc580658476c5f525ec8735104"
},
{
"tags": [
"patch"
],
"url": "https://github.com/python/cpython/commit/3c59b8b53fc75c7f9578d16fb8201ceb43e8f76c"
},
{
"tags": [
"patch"
],
"url": "https://github.com/python/cpython/commit/f795e042043dfe26c42e1971d4502c1cdc4c65b8"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "BaseCookie.js_output() does not neutralize embedded characters",
"x_generator": {
"engine": "Vulnogram 0.6.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "28c92f92-d60d-412d-b760-e73465c3df22",
"assignerShortName": "PSF",
"cveId": "CVE-2026-6019",
"datePublished": "2026-04-22T19:28:08.720Z",
"dateReserved": "2026-04-09T15:35:00.668Z",
"dateUpdated": "2026-04-29T15:31:09.049Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-6019",
"date": "2026-04-29",
"epss": "0.00051",
"percentile": "0.1577"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-6019\",\"sourceIdentifier\":\"cna@python.org\",\"published\":\"2026-04-22T20:16:42.617\",\"lastModified\":\"2026-04-29T16:16:28.240\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"http.cookies.Morsel.js_output() returns an inline \u003cscript\u003e snippet and only escapes \\\" for JavaScript string context. It does not neutralize the HTML parser-sensitive sequence \u003c/script\u003e inside the generated script element. Mitigation base64-encodes the cookie value to disallow escaping using cookie value.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"cna@python.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":2.1,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"LOW\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"cna@python.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-150\"}]}],\"references\":[{\"url\":\"https://github.com/python/cpython/commit/3c59b8b53fc75c7f9578d16fb8201ceb43e8f76c\",\"source\":\"cna@python.org\"},{\"url\":\"https://github.com/python/cpython/commit/76b3923d688c0efc580658476c5f525ec8735104\",\"source\":\"cna@python.org\"},{\"url\":\"https://github.com/python/cpython/commit/f795e042043dfe26c42e1971d4502c1cdc4c65b8\",\"source\":\"cna@python.org\"},{\"url\":\"https://github.com/python/cpython/issues/90309\",\"source\":\"cna@python.org\"},{\"url\":\"https://github.com/python/cpython/pull/148848\",\"source\":\"cna@python.org\"},{\"url\":\"https://mail.python.org/archives/list/security-announce@python.org/thread/IVNWGV2BBNC3RHQAFS22UP4DY56SAXX3/\",\"source\":\"cna@python.org\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-6019\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-22T20:02:17.071906Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-22T20:02:21.519Z\"}}], \"cna\": {\"title\": \"BaseCookie.js_output() does not neutralize embedded characters\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"oolongeya (https://github.com/komi22)\"}, {\"lang\": \"en\", \"type\": \"coordinator\", \"value\": \"Seth Larson (https://github.com/sethmlarson)\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 2.1, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"LOW\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N\", \"exploitMaturity\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"HIGH\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"LOW\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"LOW\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/python/cpython\", \"vendor\": \"Python Software Foundation\", \"product\": \"CPython\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"3.15.0\", \"versionType\": \"python\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://github.com/python/cpython/pull/148848\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/python/cpython/issues/90309\", \"tags\": [\"issue-tracking\"]}, {\"url\": \"https://mail.python.org/archives/list/security-announce@python.org/thread/IVNWGV2BBNC3RHQAFS22UP4DY56SAXX3/\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://github.com/python/cpython/commit/76b3923d688c0efc580658476c5f525ec8735104\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/python/cpython/commit/3c59b8b53fc75c7f9578d16fb8201ceb43e8f76c\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/python/cpython/commit/f795e042043dfe26c42e1971d4502c1cdc4c65b8\", \"tags\": [\"patch\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.6.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"http.cookies.Morsel.js_output() returns an inline \u003cscript\u003e snippet and only escapes \\\" for JavaScript string context. It does not neutralize the HTML parser-sensitive sequence \u003c/script\u003e inside the generated script element. Mitigation base64-encodes the cookie value to disallow escaping using cookie value.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003ccode\u003ehttp.cookies.Morsel.js_output()\u003c/code\u003e returns an inline \u003ccode\u003e\u0026lt;script\u0026gt;\u003c/code\u003e snippet and only escapes \u003ccode\u003e\\\"\u003c/code\u003e for JavaScript string context. It does not neutralize the HTML parser-sensitive sequence \u003ccode\u003e\u0026lt;/script\u0026gt;\u003c/code\u003e inside the generated script element. Mitigation base64-encodes the cookie value to disallow escaping using cookie value.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-150\", \"description\": \"CWE-150 Improper neutralization of escape, meta, or control sequences\"}]}], \"providerMetadata\": {\"orgId\": \"28c92f92-d60d-412d-b760-e73465c3df22\", \"shortName\": \"PSF\", \"dateUpdated\": \"2026-04-29T15:31:09.049Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-6019\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-29T15:31:09.049Z\", \"dateReserved\": \"2026-04-09T15:35:00.668Z\", \"assignerOrgId\": \"28c92f92-d60d-412d-b760-e73465c3df22\", \"datePublished\": \"2026-04-22T19:28:08.720Z\", \"assignerShortName\": \"PSF\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
bit-python-2026-6019
Vulnerability from bitnami_vulndb
http.cookies.Morsel.js_output() returns an inline snippet and only escapes " for JavaScript string context. It does not neutralize the HTML parser-sensitive sequence inside the generated script element. Mitigation base64-encodes the cookie value to disallow escaping using cookie value.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "python",
"purl": "pkg:bitnami/python"
},
"ranges": [
{
"events": [
{
"introduced": "0"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"type": "CVSS_V4"
}
]
}
],
"aliases": [
"CVE-2026-6019"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*"
],
"severity": "Low"
},
"details": "http.cookies.Morsel.js_output() returns an inline \u003cscript\u003e snippet and only escapes \" for JavaScript string context. It does not neutralize the HTML parser-sensitive sequence \u003c/script\u003e inside the generated script element. Mitigation base64-encodes the cookie value to disallow escaping using cookie value.",
"id": "BIT-python-2026-6019",
"modified": "2026-04-30T09:12:59.139Z",
"published": "2026-04-24T16:10:57.623Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/76b3923d688c0efc580658476c5f525ec8735104"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/issues/90309"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/pull/148848"
},
{
"type": "WEB",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/IVNWGV2BBNC3RHQAFS22UP4DY56SAXX3/"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6019"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/3c59b8b53fc75c7f9578d16fb8201ceb43e8f76c"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/f795e042043dfe26c42e1971d4502c1cdc4c65b8"
}
],
"schema_version": "1.6.2",
"summary": "BaseCookie.js_output() does not neutralize embedded characters"
}
bit-libpython-2026-6019
Vulnerability from bitnami_vulndb
http.cookies.Morsel.js_output() returns an inline snippet and only escapes " for JavaScript string context. It does not neutralize the HTML parser-sensitive sequence inside the generated script element. Mitigation base64-encodes the cookie value to disallow escaping using cookie value.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "libpython",
"purl": "pkg:bitnami/libpython"
},
"ranges": [
{
"events": [
{
"introduced": "0"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"type": "CVSS_V4"
}
]
}
],
"aliases": [
"CVE-2026-6019"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*"
],
"severity": "Low"
},
"details": "http.cookies.Morsel.js_output() returns an inline \u003cscript\u003e snippet and only escapes \" for JavaScript string context. It does not neutralize the HTML parser-sensitive sequence \u003c/script\u003e inside the generated script element. Mitigation base64-encodes the cookie value to disallow escaping using cookie value.",
"id": "BIT-libpython-2026-6019",
"modified": "2026-04-30T09:12:59.139Z",
"published": "2026-04-24T16:04:44.111Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/76b3923d688c0efc580658476c5f525ec8735104"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/issues/90309"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/pull/148848"
},
{
"type": "WEB",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/IVNWGV2BBNC3RHQAFS22UP4DY56SAXX3/"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6019"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/3c59b8b53fc75c7f9578d16fb8201ceb43e8f76c"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/f795e042043dfe26c42e1971d4502c1cdc4c65b8"
}
],
"schema_version": "1.6.2",
"summary": "BaseCookie.js_output() does not neutralize embedded characters"
}
MSRC_CVE-2026-6019
Vulnerability from csaf_microsoft - Published: 2026-04-02 00:00 - Updated: 2026-04-30 01:55| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-6019 BaseCookie.js_output() does not neutralize embedded characters - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-6019.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "BaseCookie.js_output() does not neutralize embedded characters",
"tracking": {
"current_release_date": "2026-04-30T01:55:25.000Z",
"generator": {
"date": "2026-04-30T08:42:48.378Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-6019",
"initial_release_date": "2026-04-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-04-29T01:10:33.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-04-30T01:55:25.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "cbl2 python3 0:3.9.19-19.cbl2",
"product": {
"name": "cbl2 python3 0:3.9.19-19.cbl2",
"product_id": "3"
}
},
{
"category": "product_version_range",
"name": "azl3 python3 0:3.12.9-10.azl3",
"product": {
"name": "azl3 python3 0:3.12.9-10.azl3",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "python3"
},
{
"category": "product_name",
"name": "azl3 tensorflow 0:2.16.1-11.azl3",
"product": {
"name": "azl3 tensorflow 0:2.16.1-11.azl3",
"product_id": "2"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 python3 0:3.9.19-19.cbl2 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python3 0:3.12.9-10.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 tensorflow 0:2.16.1-11.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-6019",
"cwe": {
"id": "CWE-150",
"name": "Improper Neutralization of Escape, Meta, or Control Sequences"
},
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17084-2"
]
}
],
"notes": [
{
"category": "general",
"text": "PSF",
"title": "Assigning CNA"
}
],
"product_status": {
"known_affected": [
"17086-3",
"17084-1"
],
"known_not_affected": [
"17084-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-6019 BaseCookie.js_output() does not neutralize embedded characters - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-6019.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2026-04-29T01:10:33.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-3"
]
},
{
"category": "none_available",
"date": "2026-04-29T01:10:33.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-1"
]
}
],
"title": "BaseCookie.js_output() does not neutralize embedded characters"
}
]
}
CERTFR-2026-AVI-0482
Vulnerability from certfr_avis - Published: 2026-04-23 - Updated: 2026-04-23
Une vulnérabilité a été découverte dans CPython. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "CPython sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "CPython",
"vendor": {
"name": "Python",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-6019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6019"
}
],
"initial_release_date": "2026-04-23T00:00:00",
"last_revision_date": "2026-04-23T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0482",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans CPython. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans CPython",
"vendor_advisories": [
{
"published_at": "2026-04-22",
"title": "Bulletin de s\u00e9curit\u00e9 Python IVNWGV2BBNC3RHQAFS22UP4DY56SAXX3",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/IVNWGV2BBNC3RHQAFS22UP4DY56SAXX3/"
}
]
}
FKIE_CVE-2026-6019
Vulnerability from fkie_nvd - Published: 2026-04-22 20:16 - Updated: 2026-04-29 16:16| URL | Tags | ||
|---|---|---|---|
| cna@python.org | https://github.com/python/cpython/commit/3c59b8b53fc75c7f9578d16fb8201ceb43e8f76c | ||
| cna@python.org | https://github.com/python/cpython/commit/76b3923d688c0efc580658476c5f525ec8735104 | ||
| cna@python.org | https://github.com/python/cpython/commit/f795e042043dfe26c42e1971d4502c1cdc4c65b8 | ||
| cna@python.org | https://github.com/python/cpython/issues/90309 | ||
| cna@python.org | https://github.com/python/cpython/pull/148848 | ||
| cna@python.org | https://mail.python.org/archives/list/security-announce@python.org/thread/IVNWGV2BBNC3RHQAFS22UP4DY56SAXX3/ |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "http.cookies.Morsel.js_output() returns an inline \u003cscript\u003e snippet and only escapes \" for JavaScript string context. It does not neutralize the HTML parser-sensitive sequence \u003c/script\u003e inside the generated script element. Mitigation base64-encodes the cookie value to disallow escaping using cookie value."
}
],
"id": "CVE-2026-6019",
"lastModified": "2026-04-29T16:16:28.240",
"metrics": {
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 2.1,
"baseSeverity": "LOW",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@python.org",
"type": "Secondary"
}
]
},
"published": "2026-04-22T20:16:42.617",
"references": [
{
"source": "cna@python.org",
"url": "https://github.com/python/cpython/commit/3c59b8b53fc75c7f9578d16fb8201ceb43e8f76c"
},
{
"source": "cna@python.org",
"url": "https://github.com/python/cpython/commit/76b3923d688c0efc580658476c5f525ec8735104"
},
{
"source": "cna@python.org",
"url": "https://github.com/python/cpython/commit/f795e042043dfe26c42e1971d4502c1cdc4c65b8"
},
{
"source": "cna@python.org",
"url": "https://github.com/python/cpython/issues/90309"
},
{
"source": "cna@python.org",
"url": "https://github.com/python/cpython/pull/148848"
},
{
"source": "cna@python.org",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/IVNWGV2BBNC3RHQAFS22UP4DY56SAXX3/"
}
],
"sourceIdentifier": "cna@python.org",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-150"
}
],
"source": "cna@python.org",
"type": "Secondary"
}
]
}
OPENSUSE-SU-2026:10647-1
Vulnerability from csaf_opensuse - Published: 2026-04-28 00:00 - Updated: 2026-04-28 00:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python310-3.10.20-6.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python310-3.10.20-6.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10647",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10647-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-1502 page",
"url": "https://www.suse.com/security/cve/CVE-2026-1502/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-4786 page",
"url": "https://www.suse.com/security/cve/CVE-2026-4786/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6019 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6019/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6100 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6100/"
}
],
"title": "python310-3.10.20-6.1 on GA media",
"tracking": {
"current_release_date": "2026-04-28T00:00:00Z",
"generator": {
"date": "2026-04-28T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10647-1",
"initial_release_date": "2026-04-28T00:00:00Z",
"revision_history": [
{
"date": "2026-04-28T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python310-3.10.20-6.1.aarch64",
"product": {
"name": "python310-3.10.20-6.1.aarch64",
"product_id": "python310-3.10.20-6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-curses-3.10.20-6.1.aarch64",
"product": {
"name": "python310-curses-3.10.20-6.1.aarch64",
"product_id": "python310-curses-3.10.20-6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-dbm-3.10.20-6.1.aarch64",
"product": {
"name": "python310-dbm-3.10.20-6.1.aarch64",
"product_id": "python310-dbm-3.10.20-6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-idle-3.10.20-6.1.aarch64",
"product": {
"name": "python310-idle-3.10.20-6.1.aarch64",
"product_id": "python310-idle-3.10.20-6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-tk-3.10.20-6.1.aarch64",
"product": {
"name": "python310-tk-3.10.20-6.1.aarch64",
"product_id": "python310-tk-3.10.20-6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-3.10.20-6.1.ppc64le",
"product": {
"name": "python310-3.10.20-6.1.ppc64le",
"product_id": "python310-3.10.20-6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-curses-3.10.20-6.1.ppc64le",
"product": {
"name": "python310-curses-3.10.20-6.1.ppc64le",
"product_id": "python310-curses-3.10.20-6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-dbm-3.10.20-6.1.ppc64le",
"product": {
"name": "python310-dbm-3.10.20-6.1.ppc64le",
"product_id": "python310-dbm-3.10.20-6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-idle-3.10.20-6.1.ppc64le",
"product": {
"name": "python310-idle-3.10.20-6.1.ppc64le",
"product_id": "python310-idle-3.10.20-6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-tk-3.10.20-6.1.ppc64le",
"product": {
"name": "python310-tk-3.10.20-6.1.ppc64le",
"product_id": "python310-tk-3.10.20-6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-3.10.20-6.1.s390x",
"product": {
"name": "python310-3.10.20-6.1.s390x",
"product_id": "python310-3.10.20-6.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-curses-3.10.20-6.1.s390x",
"product": {
"name": "python310-curses-3.10.20-6.1.s390x",
"product_id": "python310-curses-3.10.20-6.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-dbm-3.10.20-6.1.s390x",
"product": {
"name": "python310-dbm-3.10.20-6.1.s390x",
"product_id": "python310-dbm-3.10.20-6.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-idle-3.10.20-6.1.s390x",
"product": {
"name": "python310-idle-3.10.20-6.1.s390x",
"product_id": "python310-idle-3.10.20-6.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-tk-3.10.20-6.1.s390x",
"product": {
"name": "python310-tk-3.10.20-6.1.s390x",
"product_id": "python310-tk-3.10.20-6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-3.10.20-6.1.x86_64",
"product": {
"name": "python310-3.10.20-6.1.x86_64",
"product_id": "python310-3.10.20-6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-curses-3.10.20-6.1.x86_64",
"product": {
"name": "python310-curses-3.10.20-6.1.x86_64",
"product_id": "python310-curses-3.10.20-6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-dbm-3.10.20-6.1.x86_64",
"product": {
"name": "python310-dbm-3.10.20-6.1.x86_64",
"product_id": "python310-dbm-3.10.20-6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-idle-3.10.20-6.1.x86_64",
"product": {
"name": "python310-idle-3.10.20-6.1.x86_64",
"product_id": "python310-idle-3.10.20-6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-tk-3.10.20-6.1.x86_64",
"product": {
"name": "python310-tk-3.10.20-6.1.x86_64",
"product_id": "python310-tk-3.10.20-6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.20-6.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-3.10.20-6.1.aarch64"
},
"product_reference": "python310-3.10.20-6.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.20-6.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-3.10.20-6.1.ppc64le"
},
"product_reference": "python310-3.10.20-6.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.20-6.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-3.10.20-6.1.s390x"
},
"product_reference": "python310-3.10.20-6.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.20-6.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-3.10.20-6.1.x86_64"
},
"product_reference": "python310-3.10.20-6.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.20-6.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-curses-3.10.20-6.1.aarch64"
},
"product_reference": "python310-curses-3.10.20-6.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.20-6.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-curses-3.10.20-6.1.ppc64le"
},
"product_reference": "python310-curses-3.10.20-6.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.20-6.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-curses-3.10.20-6.1.s390x"
},
"product_reference": "python310-curses-3.10.20-6.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.20-6.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-curses-3.10.20-6.1.x86_64"
},
"product_reference": "python310-curses-3.10.20-6.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.20-6.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.aarch64"
},
"product_reference": "python310-dbm-3.10.20-6.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.20-6.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.ppc64le"
},
"product_reference": "python310-dbm-3.10.20-6.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.20-6.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.s390x"
},
"product_reference": "python310-dbm-3.10.20-6.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.20-6.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.x86_64"
},
"product_reference": "python310-dbm-3.10.20-6.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.20-6.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-idle-3.10.20-6.1.aarch64"
},
"product_reference": "python310-idle-3.10.20-6.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.20-6.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-idle-3.10.20-6.1.ppc64le"
},
"product_reference": "python310-idle-3.10.20-6.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.20-6.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-idle-3.10.20-6.1.s390x"
},
"product_reference": "python310-idle-3.10.20-6.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.20-6.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-idle-3.10.20-6.1.x86_64"
},
"product_reference": "python310-idle-3.10.20-6.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.20-6.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-tk-3.10.20-6.1.aarch64"
},
"product_reference": "python310-tk-3.10.20-6.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.20-6.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-tk-3.10.20-6.1.ppc64le"
},
"product_reference": "python310-tk-3.10.20-6.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.20-6.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-tk-3.10.20-6.1.s390x"
},
"product_reference": "python310-tk-3.10.20-6.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.20-6.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-tk-3.10.20-6.1.x86_64"
},
"product_reference": "python310-tk-3.10.20-6.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-1502",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-1502"
}
],
"notes": [
{
"category": "general",
"text": "CR/LF bytes were not rejected by HTTP client proxy tunnel headers or host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-1502",
"url": "https://www.suse.com/security/cve/CVE-2026-1502"
},
{
"category": "external",
"summary": "SUSE Bug 1261969 for CVE-2026-1502",
"url": "https://bugzilla.suse.com/1261969"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-1502"
},
{
"cve": "CVE-2026-4786",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-4786"
}
],
"notes": [
{
"category": "general",
"text": "Mitgation of CVE-2026-4519 was incomplete. If the URL contained \"%action\" the mitigation could be bypassed for certain browser types the \"webbrowser.open()\" API could have commands injected into the underlying shell. See CVE-2026-4519 for details.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-4786",
"url": "https://www.suse.com/security/cve/CVE-2026-4786"
},
{
"category": "external",
"summary": "SUSE Bug 1260026 for CVE-2026-4786",
"url": "https://bugzilla.suse.com/1260026"
},
{
"category": "external",
"summary": "SUSE Bug 1262319 for CVE-2026-4786",
"url": "https://bugzilla.suse.com/1262319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-4786"
},
{
"cve": "CVE-2026-6019",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6019"
}
],
"notes": [
{
"category": "general",
"text": "http.cookies.Morsel.js_output() returns an inline \u003cscript\u003e snippet and only escapes \" for JavaScript string context. It does not neutralize the HTML parser-sensitive sequence \u003c/script\u003e inside the generated script element. Mitigation base64-encodes the cookie value to disallow escaping using cookie value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6019",
"url": "https://www.suse.com/security/cve/CVE-2026-6019"
},
{
"category": "external",
"summary": "SUSE Bug 1262654 for CVE-2026-6019",
"url": "https://bugzilla.suse.com/1262654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-28T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2026-6019"
},
{
"cve": "CVE-2026-6100",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6100"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free (UAF) was possible in the `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile` when a memory allocation fails with a `MemoryError` and the decompression instance is re-used. This scenario can be triggered if the process is under memory pressure. The fix cleans up the dangling pointer in this specific error condition.\n\nThe vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`, `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6100",
"url": "https://www.suse.com/security/cve/CVE-2026-6100"
},
{
"category": "external",
"summary": "SUSE Bug 1262098 for CVE-2026-6100",
"url": "https://bugzilla.suse.com/1262098"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.20-6.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.20-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-6100"
}
]
}
OPENSUSE-SU-2026:10648-1
Vulnerability from csaf_opensuse - Published: 2026-04-28 00:00 - Updated: 2026-04-28 00:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python315-3.15.0~a8-3.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python315-3.15.0~a8-3.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10648",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10648-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-1502 page",
"url": "https://www.suse.com/security/cve/CVE-2026-1502/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-4786 page",
"url": "https://www.suse.com/security/cve/CVE-2026-4786/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5713 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5713/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6019 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6019/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-6100 page",
"url": "https://www.suse.com/security/cve/CVE-2026-6100/"
}
],
"title": "python315-3.15.0~a8-3.1 on GA media",
"tracking": {
"current_release_date": "2026-04-28T00:00:00Z",
"generator": {
"date": "2026-04-28T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10648-1",
"initial_release_date": "2026-04-28T00:00:00Z",
"revision_history": [
{
"date": "2026-04-28T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python315-3.15.0~a8-3.1.aarch64",
"product": {
"name": "python315-3.15.0~a8-3.1.aarch64",
"product_id": "python315-3.15.0~a8-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python315-curses-3.15.0~a8-3.1.aarch64",
"product": {
"name": "python315-curses-3.15.0~a8-3.1.aarch64",
"product_id": "python315-curses-3.15.0~a8-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python315-dbm-3.15.0~a8-3.1.aarch64",
"product": {
"name": "python315-dbm-3.15.0~a8-3.1.aarch64",
"product_id": "python315-dbm-3.15.0~a8-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python315-idle-3.15.0~a8-3.1.aarch64",
"product": {
"name": "python315-idle-3.15.0~a8-3.1.aarch64",
"product_id": "python315-idle-3.15.0~a8-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python315-profiling-3.15.0~a8-3.1.aarch64",
"product": {
"name": "python315-profiling-3.15.0~a8-3.1.aarch64",
"product_id": "python315-profiling-3.15.0~a8-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python315-tk-3.15.0~a8-3.1.aarch64",
"product": {
"name": "python315-tk-3.15.0~a8-3.1.aarch64",
"product_id": "python315-tk-3.15.0~a8-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python315-x86-64-v3-3.15.0~a8-3.1.aarch64",
"product": {
"name": "python315-x86-64-v3-3.15.0~a8-3.1.aarch64",
"product_id": "python315-x86-64-v3-3.15.0~a8-3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python315-3.15.0~a8-3.1.ppc64le",
"product": {
"name": "python315-3.15.0~a8-3.1.ppc64le",
"product_id": "python315-3.15.0~a8-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python315-curses-3.15.0~a8-3.1.ppc64le",
"product": {
"name": "python315-curses-3.15.0~a8-3.1.ppc64le",
"product_id": "python315-curses-3.15.0~a8-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python315-dbm-3.15.0~a8-3.1.ppc64le",
"product": {
"name": "python315-dbm-3.15.0~a8-3.1.ppc64le",
"product_id": "python315-dbm-3.15.0~a8-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python315-idle-3.15.0~a8-3.1.ppc64le",
"product": {
"name": "python315-idle-3.15.0~a8-3.1.ppc64le",
"product_id": "python315-idle-3.15.0~a8-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python315-profiling-3.15.0~a8-3.1.ppc64le",
"product": {
"name": "python315-profiling-3.15.0~a8-3.1.ppc64le",
"product_id": "python315-profiling-3.15.0~a8-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python315-tk-3.15.0~a8-3.1.ppc64le",
"product": {
"name": "python315-tk-3.15.0~a8-3.1.ppc64le",
"product_id": "python315-tk-3.15.0~a8-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python315-x86-64-v3-3.15.0~a8-3.1.ppc64le",
"product": {
"name": "python315-x86-64-v3-3.15.0~a8-3.1.ppc64le",
"product_id": "python315-x86-64-v3-3.15.0~a8-3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python315-3.15.0~a8-3.1.s390x",
"product": {
"name": "python315-3.15.0~a8-3.1.s390x",
"product_id": "python315-3.15.0~a8-3.1.s390x"
}
},
{
"category": "product_version",
"name": "python315-curses-3.15.0~a8-3.1.s390x",
"product": {
"name": "python315-curses-3.15.0~a8-3.1.s390x",
"product_id": "python315-curses-3.15.0~a8-3.1.s390x"
}
},
{
"category": "product_version",
"name": "python315-dbm-3.15.0~a8-3.1.s390x",
"product": {
"name": "python315-dbm-3.15.0~a8-3.1.s390x",
"product_id": "python315-dbm-3.15.0~a8-3.1.s390x"
}
},
{
"category": "product_version",
"name": "python315-idle-3.15.0~a8-3.1.s390x",
"product": {
"name": "python315-idle-3.15.0~a8-3.1.s390x",
"product_id": "python315-idle-3.15.0~a8-3.1.s390x"
}
},
{
"category": "product_version",
"name": "python315-profiling-3.15.0~a8-3.1.s390x",
"product": {
"name": "python315-profiling-3.15.0~a8-3.1.s390x",
"product_id": "python315-profiling-3.15.0~a8-3.1.s390x"
}
},
{
"category": "product_version",
"name": "python315-tk-3.15.0~a8-3.1.s390x",
"product": {
"name": "python315-tk-3.15.0~a8-3.1.s390x",
"product_id": "python315-tk-3.15.0~a8-3.1.s390x"
}
},
{
"category": "product_version",
"name": "python315-x86-64-v3-3.15.0~a8-3.1.s390x",
"product": {
"name": "python315-x86-64-v3-3.15.0~a8-3.1.s390x",
"product_id": "python315-x86-64-v3-3.15.0~a8-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python315-3.15.0~a8-3.1.x86_64",
"product": {
"name": "python315-3.15.0~a8-3.1.x86_64",
"product_id": "python315-3.15.0~a8-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python315-curses-3.15.0~a8-3.1.x86_64",
"product": {
"name": "python315-curses-3.15.0~a8-3.1.x86_64",
"product_id": "python315-curses-3.15.0~a8-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python315-dbm-3.15.0~a8-3.1.x86_64",
"product": {
"name": "python315-dbm-3.15.0~a8-3.1.x86_64",
"product_id": "python315-dbm-3.15.0~a8-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python315-idle-3.15.0~a8-3.1.x86_64",
"product": {
"name": "python315-idle-3.15.0~a8-3.1.x86_64",
"product_id": "python315-idle-3.15.0~a8-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python315-profiling-3.15.0~a8-3.1.x86_64",
"product": {
"name": "python315-profiling-3.15.0~a8-3.1.x86_64",
"product_id": "python315-profiling-3.15.0~a8-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python315-tk-3.15.0~a8-3.1.x86_64",
"product": {
"name": "python315-tk-3.15.0~a8-3.1.x86_64",
"product_id": "python315-tk-3.15.0~a8-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python315-x86-64-v3-3.15.0~a8-3.1.x86_64",
"product": {
"name": "python315-x86-64-v3-3.15.0~a8-3.1.x86_64",
"product_id": "python315-x86-64-v3-3.15.0~a8-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-3.15.0~a8-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-3.15.0~a8-3.1.aarch64"
},
"product_reference": "python315-3.15.0~a8-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-3.15.0~a8-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-3.15.0~a8-3.1.ppc64le"
},
"product_reference": "python315-3.15.0~a8-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-3.15.0~a8-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-3.15.0~a8-3.1.s390x"
},
"product_reference": "python315-3.15.0~a8-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-3.15.0~a8-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-3.15.0~a8-3.1.x86_64"
},
"product_reference": "python315-3.15.0~a8-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-curses-3.15.0~a8-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.aarch64"
},
"product_reference": "python315-curses-3.15.0~a8-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-curses-3.15.0~a8-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.ppc64le"
},
"product_reference": "python315-curses-3.15.0~a8-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-curses-3.15.0~a8-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.s390x"
},
"product_reference": "python315-curses-3.15.0~a8-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-curses-3.15.0~a8-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.x86_64"
},
"product_reference": "python315-curses-3.15.0~a8-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-dbm-3.15.0~a8-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.aarch64"
},
"product_reference": "python315-dbm-3.15.0~a8-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-dbm-3.15.0~a8-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.ppc64le"
},
"product_reference": "python315-dbm-3.15.0~a8-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-dbm-3.15.0~a8-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.s390x"
},
"product_reference": "python315-dbm-3.15.0~a8-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-dbm-3.15.0~a8-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.x86_64"
},
"product_reference": "python315-dbm-3.15.0~a8-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-idle-3.15.0~a8-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.aarch64"
},
"product_reference": "python315-idle-3.15.0~a8-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-idle-3.15.0~a8-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.ppc64le"
},
"product_reference": "python315-idle-3.15.0~a8-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-idle-3.15.0~a8-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.s390x"
},
"product_reference": "python315-idle-3.15.0~a8-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-idle-3.15.0~a8-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.x86_64"
},
"product_reference": "python315-idle-3.15.0~a8-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-profiling-3.15.0~a8-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.aarch64"
},
"product_reference": "python315-profiling-3.15.0~a8-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-profiling-3.15.0~a8-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.ppc64le"
},
"product_reference": "python315-profiling-3.15.0~a8-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-profiling-3.15.0~a8-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.s390x"
},
"product_reference": "python315-profiling-3.15.0~a8-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-profiling-3.15.0~a8-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.x86_64"
},
"product_reference": "python315-profiling-3.15.0~a8-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-tk-3.15.0~a8-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.aarch64"
},
"product_reference": "python315-tk-3.15.0~a8-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-tk-3.15.0~a8-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.ppc64le"
},
"product_reference": "python315-tk-3.15.0~a8-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-tk-3.15.0~a8-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.s390x"
},
"product_reference": "python315-tk-3.15.0~a8-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-tk-3.15.0~a8-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.x86_64"
},
"product_reference": "python315-tk-3.15.0~a8-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-x86-64-v3-3.15.0~a8-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.aarch64"
},
"product_reference": "python315-x86-64-v3-3.15.0~a8-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-x86-64-v3-3.15.0~a8-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.ppc64le"
},
"product_reference": "python315-x86-64-v3-3.15.0~a8-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-x86-64-v3-3.15.0~a8-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.s390x"
},
"product_reference": "python315-x86-64-v3-3.15.0~a8-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-x86-64-v3-3.15.0~a8-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.x86_64"
},
"product_reference": "python315-x86-64-v3-3.15.0~a8-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-1502",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-1502"
}
],
"notes": [
{
"category": "general",
"text": "CR/LF bytes were not rejected by HTTP client proxy tunnel headers or host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-1502",
"url": "https://www.suse.com/security/cve/CVE-2026-1502"
},
{
"category": "external",
"summary": "SUSE Bug 1261969 for CVE-2026-1502",
"url": "https://bugzilla.suse.com/1261969"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-1502"
},
{
"cve": "CVE-2026-4786",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-4786"
}
],
"notes": [
{
"category": "general",
"text": "Mitgation of CVE-2026-4519 was incomplete. If the URL contained \"%action\" the mitigation could be bypassed for certain browser types the \"webbrowser.open()\" API could have commands injected into the underlying shell. See CVE-2026-4519 for details.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-4786",
"url": "https://www.suse.com/security/cve/CVE-2026-4786"
},
{
"category": "external",
"summary": "SUSE Bug 1260026 for CVE-2026-4786",
"url": "https://bugzilla.suse.com/1260026"
},
{
"category": "external",
"summary": "SUSE Bug 1262319 for CVE-2026-4786",
"url": "https://bugzilla.suse.com/1262319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-4786"
},
{
"cve": "CVE-2026-5713",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5713"
}
],
"notes": [
{
"category": "general",
"text": "The \"profiling.sampling\" module (Python 3.15+) and \"asyncio introspection capabilities\" (3.14+, \"python -m asyncio ps\" and \"python -m asyncio pstree\") features could be used to read and write addresses in a privileged process if that process connected to a malicious or \"infected\" Python process via the remote debugging feature. This vulnerability requires persistently and repeatedly connecting to the process to be exploited, even after the connecting process crashes with high likelihood due to ASLR.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5713",
"url": "https://www.suse.com/security/cve/CVE-2026-5713"
},
{
"category": "external",
"summary": "SUSE Bug 1262132 for CVE-2026-5713",
"url": "https://bugzilla.suse.com/1262132"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-5713"
},
{
"cve": "CVE-2026-6019",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6019"
}
],
"notes": [
{
"category": "general",
"text": "http.cookies.Morsel.js_output() returns an inline \u003cscript\u003e snippet and only escapes \" for JavaScript string context. It does not neutralize the HTML parser-sensitive sequence \u003c/script\u003e inside the generated script element. Mitigation base64-encodes the cookie value to disallow escaping using cookie value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6019",
"url": "https://www.suse.com/security/cve/CVE-2026-6019"
},
{
"category": "external",
"summary": "SUSE Bug 1262654 for CVE-2026-6019",
"url": "https://bugzilla.suse.com/1262654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-28T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2026-6019"
},
{
"cve": "CVE-2026-6100",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-6100"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free (UAF) was possible in the `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile` when a memory allocation fails with a `MemoryError` and the decompression instance is re-used. This scenario can be triggered if the process is under memory pressure. The fix cleans up the dangling pointer in this specific error condition.\n\nThe vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`, `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-6100",
"url": "https://www.suse.com/security/cve/CVE-2026-6100"
},
{
"category": "external",
"summary": "SUSE Bug 1262098 for CVE-2026-6100",
"url": "https://bugzilla.suse.com/1262098"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a8-3.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a8-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-6100"
}
]
}
GHSA-2755-2MM4-RM5C
Vulnerability from github – Published: 2026-04-22 21:32 – Updated: 2026-04-22 21:32http.cookies.Morsel.js_output() returns an inline snippet and only escapes " for JavaScript string context. It does not neutralize the HTML parser-sensitive sequence inside the generated script element. Mitigation base64-encodes the cookie value to disallow escaping using cookie value.
{
"affected": [],
"aliases": [
"CVE-2026-6019"
],
"database_specific": {
"cwe_ids": [
"CWE-150"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-04-22T20:16:42Z",
"severity": "LOW"
},
"details": "http.cookies.Morsel.js_output() returns an inline \u003cscript\u003e snippet and only escapes \" for JavaScript string context. It does not neutralize the HTML parser-sensitive sequence \u003c/script\u003e inside the generated script element. Mitigation base64-encodes the cookie value to disallow escaping using cookie value.",
"id": "GHSA-2755-2mm4-rm5c",
"modified": "2026-04-22T21:32:11Z",
"published": "2026-04-22T21:32:11Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6019"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/issues/90309"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/pull/148848"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/76b3923d688c0efc580658476c5f525ec8735104"
},
{
"type": "WEB",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/IVNWGV2BBNC3RHQAFS22UP4DY56SAXX3"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"type": "CVSS_V4"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.