Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4583-1 | python3.9 security update |
Tue, 17 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Python
Python cpython |
|
| Vendors & Products |
Python
Python cpython |
Tue, 17 Mar 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-791 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 16 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-116 CWE-20 |
|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 16 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output(). | |
| Title | Incomplete control character validation in http.cookies | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: PSF
Published:
Updated: 2026-04-07T22:01:41.034Z
Reserved: 2026-03-06T16:13:09.289Z
Link: CVE-2026-3644
Updated: 2026-03-16T18:24:32.300Z
Status : Awaiting Analysis
Published: 2026-03-16T18:16:09.907
Modified: 2026-03-17T14:20:01.670
Link: CVE-2026-3644
OpenCVE Enrichment
Updated: 2026-03-24T10:50:05Z
Debian DLA