CVE-2026-3644
Published: March 17, 2026Last modified: April 22, 2026
Description
The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output().
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | python3 | Unknown (3.11.3-r0) |
| 25 LTS | python3 | Unknown (3.12.10-r1) | |
| Stream | python3 | Fixed (3.14.3-r1) | |
| Hardened Containers | 23 LTS | python3 | Unknown (3.11.3-r0) |
| 25 LTS | python3 | Unknown (3.12.10-r1) | |
| Stream | python3 | Fixed (3.14.3-r1) |
References
- https://github.com/python/cpython/commit/57e88c1cf95e1481b94ae57abe1010469d47a6b4
- https://github.com/python/cpython/commit/62ceb396fcbe69da1ded3702de586f4072b590dd
- https://github.com/python/cpython/commit/d16ecc6c3626f0e2cc8f08c309c83934e8a979dd
- https://github.com/python/cpython/issues/145599
- https://github.com/python/cpython/pull/145600
- https://mail.python.org/archives/list/[email protected]/thread/H6CADMBCDRFGWCMOXWUIHFJNV43GABJ7/
- https://github.com/python/cpython/pull/146025
- https://github.com/python/cpython/pull/146026