Release date:
2025-09-30 17:09:27 UTC
Description:
* SECURITY UPDATE: DOS, buffer overflow in SHA3, Possible Bypass Blocklisting
Redirection vulnerability in http.server, regex DOS, Quadratic complexity,
pathname quoting for venv
- debian/patches/CVE-2022-37454.patch: fix a buffer overflow in
Modules/_sha3/kcp/KeccakSponge.inc, Lib/test/test_hashlib.py
(LP: #1995197).
- debian/patches/CVE-2022-45061.patch: fix quadratic time idna decoding
in Lib/encodings/idna.py, Lib/test/test_codecs.py.
- debian/patches/CVE-2023-24329.patch: enforce
that a scheme must begin with an alphabetical ASCII character
in Lib/urllib/parse.py, Lib/test/test_urlparse.py.
start stripping C0 control and space chars in `urlsplit`
- debian/patches/CVE-2021-28861.patch: Fix an open
redirection vulnerability in the `http.server` module
when an URI path starts with `//`
- debian/patches/CVE-2024-6232.patch: Fix header parsing vulnerability that
could lead to ReDoS
- debian/patches/CVE-2024-7592.patch: fix quadratic complexity in parsing
"-quoted cookie values with backslashes
- debian/patches/CVE-2024-9287.patch: Quote template strings in `venv` activation
- CVE-2022-37454
- CVE-2022-45061
- CVE-2023-24329
- CVE-2021-28861
- CVE-2024-6232
- CVE-2024-7592
- CVE-2024-9287
Updated packages:
-
alt-python36_3.6.15-14_amd64.deb
sha:fe6f98488d27908b23b437bb0bd312cd75278179
-
alt-python36-debug_3.6.15-14_amd64.deb
sha:03f2bbde5c9b25658e34338a726f7900525cd15d
-
alt-python36-devel_3.6.15-14_amd64.deb
sha:b051b6ea4d8d71412817a2df42ce79f4e5c310c2
-
alt-python36-libs_3.6.15-14_amd64.deb
sha:9c0051bc4b1db11245cbd39b61a99fbece6e3a47
-
alt-python36-test_3.6.15-14_amd64.deb
sha:46ad415d8259f120034273521455c28da394f71f
-
alt-python36-tkinter_3.6.15-14_amd64.deb
sha:b731c343f166913aa8c98e0c63111f883823a7be
-
alt-python36-tools_3.6.15-14_amd64.deb
sha:e4131f7359a4851104fed6bffaa328e47f005067
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.