CVE-2026-1299 Affecting python3-base package, versions <3.6.15-150300.10.109.1


Severity

Recommended
0.0
high
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.04% (14th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-SLES155-PYTHON3BASE-15870807
  • published1 Apr 2026
  • disclosed26 Mar 2026

Introduced: 26 Mar 2026

NewCVE-2026-1299  (opens in a new tab)

How to fix?

Upgrade SLES:15.5 python3-base to version 3.6.15-150300.10.109.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python3-base package and not the python3-base package as distributed by SLES. See How to fix? for SLES:15.5 relevant fixed versions and status.

The email module, specifically the "BytesGenerator" class, didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized. This is only applicable if using "LiteralHeader" writing headers that don't respect email folding rules, the new behavior will reject the incorrectly folded headers in "BytesGenerator".

CVSS Base Scores

version 3.1