Back

Multiple Python Security Flaws Addressed in SUSE Updates

Severity: High (Score: 72.0)

Sources: Linuxsecurity

Summary

SUSE has released critical updates for Python 3.11 and Python 3.6, addressing numerous security vulnerabilities. The updates for Python 3.11 (version 3.11.15) include fixes for CVE-2025-6075, CVE-2025-11468, CVE-2025-12084, CVE-2025-13462, and CVE-2025-13836, which involve issues like performance degradation, header injection, denial of service, and incorrect parsing of TarInfo headers. Additionally, the Python 3.6 update resolves CVE-2025-13462, CVE-2026-3479, CVE-2026-3644, CVE-2026-4224, and CVE-2026-4519, with vulnerabilities ranging from path traversal to C stack overflow. These vulnerabilities could potentially allow attackers to exploit affected systems, impacting users of SUSE Linux 12 SP5 and SUSE Linux 15 SP7. Users are advised to apply the patches immediately to mitigate risks. The updates were published on April 15, 2026, following the discovery of these vulnerabilities in the preceding months. Key Points: • SUSE released updates for Python 3.11 and Python 3.6 on April 15, 2026. • Critical vulnerabilities include denial of service and path traversal issues. • Users are urged to apply patches promptly to secure their systems.

Key Entities

  • Denial of Service (attack_type)
  • CVE-2025-11468 (cve)
  • CVE-2025-12084 (cve)
  • CVE-2025-13462 (cve)
  • CVE-2025-13836 (cve)
  • CVE-2025-13837 (cve)
  • Linux (platform)
  • Python (tool)
  • Path Traversal (vulnerability)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed