OESA-2026-2116

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2026-2116
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2026-2116.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2026-2116
Upstream
  • CVE-2026-1502
  • CVE-2026-4786
  • CVE-2026-6100
Published
2026-04-25T05:51:21Z
Modified
2026-04-25T06:05:08.752819Z
Summary
python3 security update
Details

Python combines remarkable power with very clear syntax. It has modules, classes, exceptions, very high level dynamic data types, and dynamic typing. There are interfaces to many system calls and libraries, as well as to various windowing systems. New built-in modules are easily written in C or C++ (or other languages, depending on the chosen implementation). Python is also usable as an extension language for applications written in other languages that need easy-to-use scripting or automation interfaces.

Security Fix(es):

CR/LF bytes were not rejected by HTTP client proxy tunnel headers or host.(CVE-2026-1502)

Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be bypassed for certain browser types the "webbrowser.open()" API could have commands injected into the underlying shell. See CVE-2026-4519 for details.(CVE-2026-4786)

Use-after-free (UAF) was possible in the lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile when a memory allocation fails with a MemoryError and the decompression instance is re-used. This scenario can be triggered if the process is under memory pressure. The fix cleans up the dangling pointer in this specific error condition.

The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a MemoryError is raised during decompression. Using the helper functions to one-shot decompress data such as lzma.decompress(), bz2.decompress(), gzip.decompress(), and zlib.decompress() are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.(CVE-2026-6100)

Database specific
{
    "severity": "Critical"
}
References

Affected packages

openEuler:24.03-LTS-SP3 / python3

Package

Name
python3
Purl
pkg:rpm/openEuler/python3&distro=openEuler-24.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.11.6-28.oe2403sp3

Ecosystem specific

{
    "src": [
        "python3-3.11.6-28.oe2403sp3.src.rpm"
    ],
    "aarch64": [
        "python3-3.11.6-28.oe2403sp3.aarch64.rpm",
        "python3-debug-3.11.6-28.oe2403sp3.aarch64.rpm",
        "python3-debuginfo-3.11.6-28.oe2403sp3.aarch64.rpm",
        "python3-debugsource-3.11.6-28.oe2403sp3.aarch64.rpm",
        "python3-devel-3.11.6-28.oe2403sp3.aarch64.rpm",
        "python3-tkinter-3.11.6-28.oe2403sp3.aarch64.rpm",
        "python3-unversioned-command-3.11.6-28.oe2403sp3.aarch64.rpm"
    ],
    "x86_64": [
        "python3-3.11.6-28.oe2403sp3.x86_64.rpm",
        "python3-debug-3.11.6-28.oe2403sp3.x86_64.rpm",
        "python3-debuginfo-3.11.6-28.oe2403sp3.x86_64.rpm",
        "python3-debugsource-3.11.6-28.oe2403sp3.x86_64.rpm",
        "python3-devel-3.11.6-28.oe2403sp3.x86_64.rpm",
        "python3-tkinter-3.11.6-28.oe2403sp3.x86_64.rpm",
        "python3-unversioned-command-3.11.6-28.oe2403sp3.x86_64.rpm"
    ],
    "noarch": [
        "python3-help-3.11.6-28.oe2403sp3.noarch.rpm"
    ]
}

Database specific

source
"https://repo.openeuler.org/security/data/osv/OESA-2026-2116.json"