[CLSA-2026:1778747065] Fix CVE(s): CVE-2025-15282, CVE-2026-0672, CVE-2026-3644, CVE-2026-4224
Type:
security
Severity:
Moderate
Release date:
2026-05-14 08:24:31 UTC
Description:
* SECURITY UPDATE: urllib.request.DataHandler accepted data: URLs whose mediatype contained control characters, allowing newline-based HTTP header injection downstream. - debian/patches/CVE-2025-15282.patch: backport of cpython f25509e78e (gh-143925, Seth Larson). Adds a [\\x00-\\x1F\\x7F] regex check in data_open() and a matching test_invalid_mediatype. - CVE-2025-15282 * SECURITY UPDATE: http.cookies.Morsel did not reject control characters in keys / values / coded_value, allowing cookie injection via __setitem__, setdefault, set, and BaseCookie.output. - debian/patches/CVE-2026-0672.patch: backport of cpython 95746b3a13 (gh-143919, Seth Larson). Adds _has_control_character helper and inserts validation in __setitem__, setdefault, set, plus a wrap of BaseCookie.OutputString / output. - CVE-2026-0672 * SECURITY UPDATE: the CVE-2026-0672 fix was incomplete; control characters could still bypass via Morsel.update(), |=, __setstate__ (pickle), and BaseCookie.js_output(). - debian/patches/CVE-2026-3644.patch: backport of cpython 57e88c1cf9 (gh-145599, Stan Ulbrych + Victor Stinner). Adds validation to Morsel.update(), defines explicit Morsel.__ior__ (was inherited from dict and bypassed validation), validates __setstate__ before assigning attributes, and re-validates the assembled output string in js_output(). - CVE-2026-3644 * SECURITY UPDATE: Modules/pyexpat.c conv_content_model could overflow the C stack when an Expat parser with a registered ElementDeclHandler parsed a deeply nested DTD content model, causing a denial-of-service. - debian/patches/CVE-2026-4224.patch: backport of cpython eb0e8be3a7 (gh-145986, Stan Ulbrych + Bénédikt Tran). Wraps conv_content_model with Py_EnterRecursiveCall / Py_LeaveRecursiveCall so deep nesting raises RecursionError instead of crashing. - CVE-2026-4224
Updated packages:
  • alt-python39_3.9.23-14_amd64.deb
    sha:d5fe147f341d3c2b45e82ef4a62f7bdf4b8c6b3b
  • alt-python39-debug_3.9.23-14_amd64.deb
    sha:235cdff5760ca9cf2779b7e6dee1137b96ca837d
  • alt-python39-devel_3.9.23-14_amd64.deb
    sha:fc0f190e7f35a73213da194a7f7e989ce5bd5722
  • alt-python39-idle_3.9.23-14_amd64.deb
    sha:3bf1bcb4b92ce7dfa261b950b002d10b6847b9ba
  • alt-python39-libs_3.9.23-14_amd64.deb
    sha:beb1ca35233e812b92eab8772b601904fa7ceea3
  • alt-python39-test_3.9.23-14_amd64.deb
    sha:aea20f56138dc605904b5692fb3b6b1c1d136e5d
  • alt-python39-tkinter_3.9.23-14_amd64.deb
    sha:5c574e56c164ea4e498a3f082b9269de829fdb56
  • alt-python39_3.9.23-14_arm64.deb
    sha:79734b0693b9138cdc560e6413b4b24bd8a9751a
  • alt-python39-debug_3.9.23-14_arm64.deb
    sha:87fa5119dd753eac83f7625662e4d5d31d2186d5
  • alt-python39-devel_3.9.23-14_arm64.deb
    sha:d400dbcaad948161d01bdcaf59333a94c3082265
  • alt-python39-idle_3.9.23-14_arm64.deb
    sha:a9637f8b09b700a35a6cc5a3c55276e9e9e91101
  • alt-python39-libs_3.9.23-14_arm64.deb
    sha:6265cb97dd16bbd4a47d0347b5eeedca01f6970d
  • alt-python39-test_3.9.23-14_arm64.deb
    sha:7d522e7f44fb38261acc31754d72def5e2255008
  • alt-python39-tkinter_3.9.23-14_arm64.deb
    sha:746bec104bec29312aa4f5a2057dc109d5fa29ea
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.