The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output().
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:10950 https://access.redhat.com/errata/RHSA-2026:10950
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:19019 https://access.redhat.com/errata/RHSA-2026:19019
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:19064 https://access.redhat.com/errata/RHSA-2026:19064
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:19176 https://access.redhat.com/errata/RHSA-2026:19176
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:19177 https://access.redhat.com/errata/RHSA-2026:19177