SB2026022619 - SUSE update for python313



SB2026022619 - SUSE update for python313

Published: February 26, 2026

Security Bulletin ID SB2026022619
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2025-11468)

The vulnerability allows a remote attacker to perform a spoofing attack.

The vulnerability exists due to insufficient validation of user-supplied input in Lib/email/_header_value_parser.py. A remote attacker can manipulate email headers and perform spoofing attack.


2) CRLF injection (CVE-ID: CVE-2025-15282)

The vulnerability allows a remote attacker to inject arbitrary data in server response.

The vulnerability exists due to insufficient validation of attacker-supplied data in urllib.request.DataHandler. A remote attacker can pass specially crafted data to the application containing CR-LF characters and modify application behavior.


3) CRLF injection (CVE-ID: CVE-2026-0672)

The vulnerability allows a remote attacker to inject arbitrary data in server response.

The vulnerability exists due to insufficient validation of attacker-supplied data when using http.cookies.Morsel. A remote attacker can pass specially crafted data to the application containing CR-LF characters and modify application behavior leading to a spoofing attack.


4) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2026-0865)

The vulnerability allows a remote attacker to perform HTTP request smuggling attacks.

The vulnerability exists due to improper validation of HTTP requests. A remote attacker can send a specially crafted HTTP request to the application and smuggle arbitrary HTTP headers.

Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.


Remediation

Install update from vendor's website.