[CLSA-2025:1760706375] Fix of 5 CVEs
Type:
security
Severity:
Moderate
Release date:
2025-10-17 13:25:44 UTC
Description:
* SECURITY UPDATE: Web cache poisoning vulnerability - debian/patches/CVE-2021-23336.patch: fix web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs - CVE-2021-23336 * SECURITY UPDATE: Regular expression denial of service - debian/patches/CVE-2021-3733.patch: fix flaw in urllib’s AbstractBasicAuthHandler that could lead to a denial of service by leveraging a regular expression - CVE-2021-3733 * SECURITY UPDATE: Constant-time-defeating optimisations issue - debian/patches/CVE-2022-48566.patch: make compare_digest more constant-time - CVE-2022-48566 * SECURITY UPDATE: Incorrect parsing of email addresses containing special characters - debian/patches/CVE-2023-27043.patch: Fix email address parsing errors by adding optional 'strict' parameter to getaddresses() and parseaddr() functions - CVE-2023-27043 * SECURITY UPDATE: TLS handshake bypass - debian/patches/CVE-2023-40217.patch: Check for & avoid the ssl pre-close flaw. Update SSL tests - CVE-2023-40217
Updated packages:
  • alt-python27_2.7.18-8_amd64.deb
    sha:be03105a4a65140b8351c4917d1201daa94b85bb
  • alt-python27-debug_2.7.18-8_amd64.deb
    sha:0812efbe5fd4d7a5d66c28e88440d4a852b8fdae
  • alt-python27-devel_2.7.18-8_amd64.deb
    sha:58186d9db033c1a2c2b1454c5e5e4c6d864b6b39
  • alt-python27-idle_2.7.18-8_amd64.deb
    sha:0afd19d9b2247e9992499de9df98a38614010892
  • alt-python27-libs_2.7.18-8_amd64.deb
    sha:169c21b537bc9ebcdab54d0ba1c07a1a5c4f62eb
  • alt-python27-test_2.7.18-8_amd64.deb
    sha:f48c212a16a726f12d7260357bc570023ba07b08
  • alt-python27-tkinter_2.7.18-8_amd64.deb
    sha:a31f10dc156269d1b1e72e7bf849d2e07c4c490d
  • alt-python27-tools_2.7.18-8_amd64.deb
    sha:b13ca924d9995230d505cbcbfa8607e5ecd58d1b
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.