Bug 2448168 (CVE-2026-3644) - CVE-2026-3644 cpython: Incomplete control character validation in http.cookies
Summary: CVE-2026-3644 cpython: Incomplete control character validation in http.cookies
Keywords:
Status: NEW
Alias: CVE-2026-3644
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2448185 2448187 2448193 2448194 2448186 2448188 2448189 2448190 2448191 2448192
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-16 18:02 UTC by OSIDB Bzimport
Modified: 2026-04-27 14:54 UTC (History)
10 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:10950 0 None None None 2026-04-27 14:54:31 UTC

Description OSIDB Bzimport 2026-03-16 18:02:51 UTC
The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output().

Comment 5 errata-xmlrpc 2026-04-27 14:54:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:10950 https://access.redhat.com/errata/RHSA-2026:10950


Note You need to log in before you can comment on or make changes to this bug.