[CLSA-2026:1778747374] Fix CVE(s): CVE-2025-15282, CVE-2026-0672, CVE-2026-3644, CVE-2026-4224
Type:
security
Severity:
Moderate
Release date:
2026-05-14 08:29:39 UTC
Description:
* SECURITY UPDATE: urllib.request.DataHandler accepted data: URLs whose mediatype contained control characters, allowing newline-based HTTP header injection downstream. - debian/patches/CVE-2025-15282.patch: backport of cpython f25509e78e (gh-143925, Seth Larson). Adds a [\\x00-\\x1F\\x7F] regex check in data_open() and a matching test_invalid_mediatype. - CVE-2025-15282 * SECURITY UPDATE: http.cookies.Morsel did not reject control characters in keys / values / coded_value, allowing cookie injection via __setitem__, setdefault, set, and BaseCookie.output. - debian/patches/CVE-2026-0672.patch: backport of cpython 95746b3a13 (gh-143919, Seth Larson). Adds _has_control_character helper and inserts validation in __setitem__, setdefault, set, plus a wrap of BaseCookie.OutputString / output. - CVE-2026-0672 * SECURITY UPDATE: the CVE-2026-0672 fix was incomplete; control characters could still bypass via Morsel.update(), |=, __setstate__ (pickle), and BaseCookie.js_output(). - debian/patches/CVE-2026-3644.patch: backport of cpython 57e88c1cf9 (gh-145599, Stan Ulbrych + Victor Stinner). Adds validation to Morsel.update(), defines explicit Morsel.__ior__ (was inherited from dict and bypassed validation), validates __setstate__ before assigning attributes, and re-validates the assembled output string in js_output(). - CVE-2026-3644 * SECURITY UPDATE: Modules/pyexpat.c conv_content_model could overflow the C stack when an Expat parser with a registered ElementDeclHandler parsed a deeply nested DTD content model, causing a denial-of-service. - debian/patches/CVE-2026-4224.patch: backport of cpython eb0e8be3a7 (gh-145986, Stan Ulbrych + Bénédikt Tran). Wraps conv_content_model with Py_EnterRecursiveCall / Py_LeaveRecursiveCall so deep nesting raises RecursionError instead of crashing. - CVE-2026-4224
Updated packages:
  • alt-python39_3.9.23-14_amd64.deb
    sha:9677c1ac03fa841870ba18083bc8d9a3848967ca
  • alt-python39-debug_3.9.23-14_amd64.deb
    sha:235cdff5760ca9cf2779b7e6dee1137b96ca837d
  • alt-python39-devel_3.9.23-14_amd64.deb
    sha:41bd806e01018a045397cbe77d610ccbd96157c2
  • alt-python39-idle_3.9.23-14_amd64.deb
    sha:663535434efa098816560e5a7e26ac48868edc86
  • alt-python39-libs_3.9.23-14_amd64.deb
    sha:97271e6909d0d00777250aebbeb8a1dc4c550c4d
  • alt-python39-test_3.9.23-14_amd64.deb
    sha:dd624a7e262f3f1da97d2afcbf51d4bf7ba180ee
  • alt-python39-tkinter_3.9.23-14_amd64.deb
    sha:834d34b681d5392f7f7f12c737c72cf290d9d384
  • alt-python39_3.9.23-14_arm64.deb
    sha:45a18d6c7024a76dfc3f44d728e56bbaa27cb6e8
  • alt-python39-debug_3.9.23-14_arm64.deb
    sha:87fa5119dd753eac83f7625662e4d5d31d2186d5
  • alt-python39-devel_3.9.23-14_arm64.deb
    sha:2cf0776dedf592e0bfdf16d169f1ee28f85f8dca
  • alt-python39-idle_3.9.23-14_arm64.deb
    sha:c5b7e511f5ce73bb9fc256278fcf79d21f5857f0
  • alt-python39-libs_3.9.23-14_arm64.deb
    sha:cb784a358e7b3a09373accc0bdbbf3d6aa617b98
  • alt-python39-test_3.9.23-14_arm64.deb
    sha:e2614f5b5e21d7da3f78923b62ae7556f9c02974
  • alt-python39-tkinter_3.9.23-14_arm64.deb
    sha:8b11b21cba71e992be415d046ef0f3ae5c87715e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.