File _patchinfo of Package patchinfo.43465

<patchinfo incident="43465">
  <issue tracker="cve" id="2026-4224"/>
  <issue tracker="cve" id="2026-3644"/>
  <issue tracker="cve" id="2026-4519"/>
  <issue tracker="cve" id="2025-13462"/>
  <issue tracker="bnc" id="1259735">VUL-0: CVE-2026-4224: python,python3,python310,python311,python312,python313,python314,python36,python39: C stack overflow when parsing XML with deeply nested DTD content models</issue>
  <issue tracker="bnc" id="1259734">VUL-0: CVE-2026-3644: python,python3,python310,python311,python312,python313,python314,python36,python39: incomplete control character validation in http.cookies</issue>
  <issue tracker="bnc" id="1259611">VUL-0: CVE-2025-13462: python,python: incorrect parsing of TarInfo header when GNU long name and type AREGTYPE are combined</issue>
  <issue tracker="bnc" id="1260026">VUL-0: CVE-2026-4519: python,python3,python310,python311,python312,python313,python314,python36,python39: leading dashes in URLs are accepted by the `webbrowser.open()` API and allow for web browser command line option injection</issue>
  <packager>mcepl</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for python</summary>
  <description>This update for python fixes the following issues:

- CVE-2025-13462: incorrect parsing of TarInfo when GNU long name and type AREGTYPE are combined can lead to
  misinterpretation of tar archives (bsc#1259611).
- CVE-2026-3644: incomplete control character validation in http.cookies can lead to input validation bypass
  (bsc#1259734).
- CVE-2026-4224: parsing XML with deeply nested DTD content models can lead to C stack overflow (bsc#1259735).
- CVE-2026-4519: failure to sanitize leading dashes in URLs in the `webbrowser.open()` API can lead to web browser
  command line option injection (bsc#1260026).
</description>
</patchinfo>
openSUSE Build Service is sponsored by