[CLSA-2025:1759247378] Fix of 7 CVEs
Type:
security
Severity:
Critical
Release date:
2025-09-30 17:10:43 UTC
Description:
* SECURITY UPDATE: DOS, buffer overflow in SHA3, Possible Bypass Blocklisting Redirection vulnerability in http.server, regex DOS, Quadratic complexity, pathname quoting for venv - debian/patches/CVE-2022-37454.patch: fix a buffer overflow in Modules/_sha3/kcp/KeccakSponge.inc, Lib/test/test_hashlib.py (LP: #1995197). - debian/patches/CVE-2022-45061.patch: fix quadratic time idna decoding in Lib/encodings/idna.py, Lib/test/test_codecs.py. - debian/patches/CVE-2023-24329.patch: enforce that a scheme must begin with an alphabetical ASCII character in Lib/urllib/parse.py, Lib/test/test_urlparse.py. start stripping C0 control and space chars in `urlsplit` - debian/patches/CVE-2021-28861.patch: Fix an open redirection vulnerability in the `http.server` module when an URI path starts with `//` - debian/patches/CVE-2024-6232.patch: Fix header parsing vulnerability that could lead to ReDoS - debian/patches/CVE-2024-7592.patch: fix quadratic complexity in parsing "-quoted cookie values with backslashes - debian/patches/CVE-2024-9287.patch: Quote template strings in `venv` activation - CVE-2022-37454 - CVE-2022-45061 - CVE-2023-24329 - CVE-2021-28861 - CVE-2024-6232 - CVE-2024-7592 - CVE-2024-9287
Updated packages:
  • alt-python36_3.6.15-14_amd64.deb
    sha:3cb4bb84c2ce74c1a650c14963afc153ab4b7be9
  • alt-python36-debug_3.6.15-14_amd64.deb
    sha:edc43c981b39a5f06d660d61b912bebc2ddf43ac
  • alt-python36-devel_3.6.15-14_amd64.deb
    sha:6766a157a9a295b208f38793cf6772b12053e0c0
  • alt-python36-libs_3.6.15-14_amd64.deb
    sha:86c1fc1ecf19560b72511d3638b7d3e2217de5fe
  • alt-python36-test_3.6.15-14_amd64.deb
    sha:899dafb0eef2ccd47c947710d6cc291e004aa0ca
  • alt-python36-tkinter_3.6.15-14_amd64.deb
    sha:e7713f6228b4b4164a8b377dd151b8554548e96a
  • alt-python36-tools_3.6.15-14_amd64.deb
    sha:22dd887a52c948090eb8d2f0090ea794b88809a3
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.