[CLSA-2026:1776324642] Fix CVE(s): CVE-2022-40897, CVE-2024-6345, CVE-2025-47273
Type:
security
Severity:
('Important', ['ELSLANG-26199', 'ELSLANG-26196', 'ELSLANG-26193'])
Release date:
2026-04-16 07:30:47 UTC
Description:
* SECURITY UPDATE: regex denial of service via crafted HTML - debian/patches/CVE-2022-40897.patch: limit whitespace matching in REL regex - CVE-2022-40897 * SECURITY UPDATE: remote code execution via command injection in VCS downloads - debian/patches/CVE-2024-6345.patch: replace os.system with subprocess.check_call - CVE-2024-6345 * SECURITY UPDATE: path traversal in download filename resolution - debian/patches/CVE-2025-47273.patch: validate download filename stays within tmpdir - CVE-2025-47273
Updated packages:
  • alt-python37-setuptools_58.3.0-3_all.deb
    sha:26d29b3a3f41102bd3e91d27e27935216086f49e
  • alt-python37-setuptools-wheel_58.3.0-3_all.deb
    sha:f348f3c63487385fe9ac964cc8bd0db4f6d054d5
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.