{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2026-32274","title":"Title"},{"category":"description","text":"Black is the uncompromising Python code formatter. Prior to 26.3.1, Black writes a cache file, the name of which is computed from various formatting options. The value of the --python-cell-magics option was placed in the filename without sanitization, which allowed an attacker who controls the value of this argument to write cache files to arbitrary file system locations. Fixed in Black 26.3.1.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2026-32274","url":"https://www.suse.com/security/cve/CVE-2026-32274"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1259608 for CVE-2026-32274","url":"https://bugzilla.suse.com/1259608"},{"category":"external","summary":"Advisory link for SUSE-SU-2026:0900-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024698.html"}],"title":"SUSE CVE CVE-2026-32274","tracking":{"current_release_date":"2026-03-16T17:32:11Z","generator":{"date":"2026-03-13T13:15:16Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2026-32274","initial_release_date":"2026-03-13T13:15:16Z","revision_history":[{"date":"2026-03-13T13:15:16Z","number":"2","summary":"vulnerabilities added,references added,severity changed from  to moderate"},{"date":"2026-03-14T00:24:36Z","number":"3","summary":"scores added,updates released"},{"date":"2026-03-15T00:23:55Z","number":"4","summary":"more updates released"},{"date":"2026-03-16T17:32:11Z","number":"5","summary":"references added"}],"status":"interim","version":"5"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Server 16.0","product":{"name":"SUSE Linux Enterprise Server 16.0","product_id":"SUSE Linux Enterprise Server 16.0","product_identification_helper":{"cpe":"cpe:/o:suse:sles:16:16.0:server"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server for SAP applications 16.0","product":{"name":"SUSE Linux Enterprise Server for SAP applications 16.0","product_id":"SUSE Linux Enterprise Server for SAP applications 16.0","product_identification_helper":{"cpe":"cpe:/o:suse:sles:16:16.0:server-sap"}}},{"category":"product_name","name":"openSUSE Leap 15.6","product":{"name":"openSUSE Leap 15.6","product_id":"openSUSE Leap 15.6","product_identification_helper":{"cpe":"cpe:/o:opensuse:leap:15.6"}}},{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"python-black","product":{"name":"python-black","product_id":"python-black","product_identification_helper":{"purl":"pkg:rpm/suse/python-black@"}}},{"category":"product_version","name":"python311-black-24.3.0-150400.9.11.1","product":{"name":"python311-black-24.3.0-150400.9.11.1","product_id":"python311-black-24.3.0-150400.9.11.1","product_identification_helper":{"purl":"pkg:rpm/suse/python311-black@24.3.0-150400.9.11.1?upstream=python-black-24.3.0-150400.9.11.1.src.rpm"}}},{"category":"product_version","name":"python311-black-26.3.1-1.1","product":{"name":"python311-black-26.3.1-1.1","product_id":"python311-black-26.3.1-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/python311-black@26.3.1-1.1?upstream=python-black-26.3.1-1.1.src.rpm"}}},{"category":"product_version","name":"python313-black","product":{"name":"python313-black","product_id":"python313-black","product_identification_helper":{"purl":"pkg:rpm/suse/python313-black@?upstream=python-black.src.rpm"}}},{"category":"product_version","name":"python313-black-26.3.1-1.1","product":{"name":"python313-black-26.3.1-1.1","product_id":"python313-black-26.3.1-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/python313-black@26.3.1-1.1?upstream=python-black-26.3.1-1.1.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"python311-black-24.3.0-150400.9.11.1 as component of openSUSE Leap 15.6","product_id":"openSUSE Leap 15.6:python311-black-24.3.0-150400.9.11.1"},"product_reference":"python311-black-24.3.0-150400.9.11.1","relates_to_product_reference":"openSUSE Leap 15.6"},{"category":"default_component_of","full_product_name":{"name":"python311-black-26.3.1-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:python311-black-26.3.1-1.1"},"product_reference":"python311-black-26.3.1-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"python313-black-26.3.1-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:python313-black-26.3.1-1.1"},"product_reference":"python313-black-26.3.1-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"python313-black as component of SUSE Linux Enterprise Server 16.0","product_id":"SUSE Linux Enterprise Server 16.0:python313-black"},"product_reference":"python313-black","relates_to_product_reference":"SUSE Linux Enterprise Server 16.0"},{"category":"default_component_of","full_product_name":{"name":"python-black as component of SUSE Linux Enterprise Server 16.0","product_id":"SUSE Linux Enterprise Server 16.0:python-black"},"product_reference":"python-black","relates_to_product_reference":"SUSE Linux Enterprise Server 16.0"},{"category":"default_component_of","full_product_name":{"name":"python313-black as component of SUSE Linux Enterprise Server for SAP applications 16.0","product_id":"SUSE Linux Enterprise Server for SAP applications 16.0:python313-black"},"product_reference":"python313-black","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP applications 16.0"},{"category":"default_component_of","full_product_name":{"name":"python-black as component of SUSE Linux Enterprise Server for SAP applications 16.0","product_id":"SUSE Linux Enterprise Server for SAP applications 16.0:python-black"},"product_reference":"python-black","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP applications 16.0"}]},"vulnerabilities":[{"cve":"CVE-2026-32274","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-32274"}],"notes":[{"category":"general","text":"Black is the uncompromising Python code formatter. Prior to 26.3.1, Black writes a cache file, the name of which is computed from various formatting options. The value of the --python-cell-magics option was placed in the filename without sanitization, which allowed an attacker who controls the value of this argument to write cache files to arbitrary file system locations. Fixed in Black 26.3.1.","title":"CVE description"}],"product_status":{"known_affected":["SUSE Linux Enterprise Server 16.0:python-black","SUSE Linux Enterprise Server 16.0:python313-black","SUSE Linux Enterprise Server for SAP applications 16.0:python-black","SUSE Linux Enterprise Server for SAP applications 16.0:python313-black"],"recommended":["openSUSE Leap 15.6:python311-black-24.3.0-150400.9.11.1","openSUSE Tumbleweed:python311-black-26.3.1-1.1","openSUSE Tumbleweed:python313-black-26.3.1-1.1"]},"references":[{"category":"external","summary":"CVE-2026-32274","url":"https://www.suse.com/security/cve/CVE-2026-32274"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1259608 for CVE-2026-32274","url":"https://bugzilla.suse.com/1259608"},{"category":"external","summary":"Advisory link for SUSE-SU-2026:0900-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2026-March/024698.html"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.6:python311-black-24.3.0-150400.9.11.1","openSUSE Tumbleweed:python311-black-26.3.1-1.1","openSUSE Tumbleweed:python313-black-26.3.1-1.1"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","version":"3.1"},"products":["openSUSE Leap 15.6:python311-black-24.3.0-150400.9.11.1","openSUSE Tumbleweed:python311-black-26.3.1-1.1","openSUSE Tumbleweed:python313-black-26.3.1-1.1"]}],"threats":[{"category":"impact","date":"2026-03-12T21:03:37Z","details":"moderate"}],"title":"CVE-2026-32274"}]}