SUSE-SU-2026:0612-1

Source
https://www.suse.com/support/update/announcement/2026/suse-su-20260612-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:0612-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2026:0612-1
Upstream
Related
Published
2026-02-24T15:14:18Z
Modified
2026-02-26T16:16:52.185550Z
Summary
Security update for python36
Details

This update for python36 fixes the following issues:

  • CVE-2025-11468: header injection when folding a long comment in an email header containing exclusively unfoldable characters (bsc#1257029).
  • CVE-2026-0672: HTTP header injection via user-controlled cookie values and parameters when using http.cookies.Morsel (bsc#1257031).
  • CVE-2026-0865: user-controlled header containing newlines can allow injecting HTTP headers (bsc#1257042).
  • CVE-2025-15366: user-controlled command can allow additional commands injected using newlines (bsc#1257044).
  • CVE-2025-15282: user-controlled data URLs parsed may allow injecting headers (bsc#1257046).
  • CVE-2025-15367: control characters may allow the injection of additional commands (bsc#1257041).
References

Affected packages

SUSE:Linux Enterprise Server 12 SP5-LTSS
python36

Package

Name
python36
Purl
pkg:rpm/suse/python36&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.6.15-100.1

Ecosystem specific

{
    "binaries": [
        {
            "python36": "3.6.15-100.1",
            "libpython3_6m1_0": "3.6.15-100.1",
            "python36-devel": "3.6.15-100.1",
            "libpython3_6m1_0-32bit": "3.6.15-100.1",
            "python36-base": "3.6.15-100.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:0612-1.json"
python36-core

Package

Name
python36-core
Purl
pkg:rpm/suse/python36-core&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.6.15-100.1

Ecosystem specific

{
    "binaries": [
        {
            "python36": "3.6.15-100.1",
            "libpython3_6m1_0": "3.6.15-100.1",
            "python36-devel": "3.6.15-100.1",
            "libpython3_6m1_0-32bit": "3.6.15-100.1",
            "python36-base": "3.6.15-100.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:0612-1.json"
SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5
python36

Package

Name
python36
Purl
pkg:rpm/suse/python36&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.6.15-100.1

Ecosystem specific

{
    "binaries": [
        {
            "python36": "3.6.15-100.1",
            "libpython3_6m1_0": "3.6.15-100.1",
            "python36-devel": "3.6.15-100.1",
            "libpython3_6m1_0-32bit": "3.6.15-100.1",
            "python36-base": "3.6.15-100.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:0612-1.json"
python36-core

Package

Name
python36-core
Purl
pkg:rpm/suse/python36-core&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.6.15-100.1

Ecosystem specific

{
    "binaries": [
        {
            "python36": "3.6.15-100.1",
            "libpython3_6m1_0": "3.6.15-100.1",
            "python36-devel": "3.6.15-100.1",
            "libpython3_6m1_0-32bit": "3.6.15-100.1",
            "python36-base": "3.6.15-100.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:0612-1.json"