File _patchinfo of Package patchinfo.42756
<patchinfo incident="42756"> <issue tracker="cve" id="2026-0865"/> <issue tracker="cve" id="2026-0672"/> <issue tracker="cve" id="2025-15367"/> <issue tracker="cve" id="2025-15282"/> <issue tracker="cve" id="2025-15366"/> <issue tracker="cve" id="2025-11468"/> <issue tracker="bnc" id="1257029">VUL-0: CVE-2025-11468: python3: header injection when folding a long comment in an email header containing exclusively unfoldable characters</issue> <issue tracker="bnc" id="1257046">VUL-0: CVE-2025-15282: python: user-controlled data URLs parsed may allow injecting headers</issue> <issue tracker="bnc" id="1257044">VUL-0: CVE-2025-15366: python: user-controlled command can allow additional commands injected using newlines</issue> <issue tracker="bnc" id="1257041">VUL-0: CVE-2025-15367: python: control characters may allow the injection of additional commands</issue> <issue tracker="bnc" id="1257042">VUL-0: CVE-2026-0865: python: user-controlled header containing newlines can allow injecting HTTP headers</issue> <issue tracker="bnc" id="1257031">VUL-0: CVE-2026-0672: python3: HTTP header injection via user-controlled cookie values and parameters when using http.cookies.Morsel</issue> <packager>mcepl</packager> <rating>important</rating> <category>security</category> <summary>Security update for python310</summary> <description>This update for python310 fixes the following issues: - CVE-2025-11468: header injection when folding a long comment in an email header containing exclusively unfoldable characters (bsc#1257029). - CVE-2026-0672: HTTP header injection via user-controlled cookie values and parameters when using http.cookies.Morsel (bsc#1257031). - CVE-2026-0865: user-controlled header containing newlines can allow injecting HTTP headers (bsc#1257042). - CVE-2025-15366: user-controlled command can allow additional commands injected using newlines (bsc#1257044). - CVE-2025-15282: user-controlled data URLs parsed may allow injecting headers (bsc#1257046). - CVE-2025-15367: control characters may allow the injection of additional commands (bsc#1257041). </description> </patchinfo>