SUSE alert openSUSE-SU-2026:0009-1 (python-cbor2)
| From: | maintenance@opensuse.org | |
| To: | security-announce@lists.opensuse.org | |
| Subject: | openSUSE-SU-2026:0009-1: moderate: Security update for python-cbor2 | |
| Date: | Mon, 12 Jan 2026 18:04:47 +0100 | |
| Message-ID: | <20260112170447.81422FBA1@maintenance.suse.de> | |
| Archive-link: | Article |
openSUSE Security Update: Security update for python-cbor2 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2026:0009-1 Rating: moderate References: #1255783 Cross-References: CVE-2025-68131 CVSS scores: CVE-2025-68131 (SUSE): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N Affected Products: openSUSE Backports SLE-15-SP7 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for python-cbor2 fixes the following issues: - CVE-2025-68131: Fixed that a attacker-controlled message can read data from previously decoded messages if the decoder is reused across trust boundaries (boo#1255783) Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP7: zypper in -t patch openSUSE-2026-9=1 Package List: - openSUSE Backports SLE-15-SP7 (aarch64 i586 ppc64le s390x x86_64): python311-cbor2-5.5.1-bp157.2.3.1 References: https://www.suse.com/security/cve/CVE-2025-68131.html https://bugzilla.suse.com/1255783
