[CLSA-2025:1767089506] Fix CVE(s): CVE-2023-27043, CVE-2023-40217
Type:
security
Severity:
Moderate
Release date:
2025-12-30 10:11:50 UTC
Description:
* SECURITY UPDATE: Bypass of domain e-mail-based protection mechanism by incorrect parsing of e-mail addresses that contain a special character - debian/patches/CVE-2023-27043.patch: reject malformed addresses in email.parseaddr() - CVE-2023-27043 * SECURITY UPDATE: Bypass of the TLS handshake and included protections - debian/patches/CVE-2023-40217.patch: check for & avoid the ssl pre-close flaw - CVE-2023-40217
Updated packages:
  • alt-python37_3.7.17-7_amd64.deb
    sha:33fc8f4b99e95f4bd7b1c6384edea2ac6a104c06
  • alt-python37-debug_3.7.17-7_amd64.deb
    sha:b9e44f0ce4f7a5bc8920d6b9d9712a86b656c16b
  • alt-python37-devel_3.7.17-7_amd64.deb
    sha:4c400a3366b1fc30190fe66be03a48c52f7dde01
  • alt-python37-libs_3.7.17-7_amd64.deb
    sha:d5f4e8a16e37c2ff1c92afba50f40697f57f0934
  • alt-python37-test_3.7.17-7_amd64.deb
    sha:fd42a25f38b00d5028ad8204daed4811c422abd7
  • alt-python37-tkinter_3.7.17-7_amd64.deb
    sha:3cad04dfef05edda138498f48542e020c1bb3383
  • alt-python37-tools_3.7.17-7_amd64.deb
    sha:8b550b9122a3d0ccfa5fc2d3300a2e15549da084
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.