Bug 35254 - python-openssl new security issues CVE-2026-27448 and CVE-2026-27459
Summary: python-openssl new security issues CVE-2026-27448 and CVE-2026-27459
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 9
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA9-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2026-03-23 09:36 CET by Nicolas Salguero
Modified: 2026-04-01 01:07 CEST (History)
3 users (show)

See Also:
Source RPM: python-openssl-23.0.0-1.mga9.src.rpm
CVE: CVE-2026-27448, CVE-2026-27459
Status comment:
j.alberto.vc: test_passed_mga9_64+


Attachments

Nicolas Salguero 2026-03-23 09:38:54 CET

Source RPM: (none) => python-openssl-25.0.0-2.mga10.src.rpm, python-openssl-23.0.0-1.mga9.src.rpm
Flags: (none) => affects_mga9+
Status comment: (none) => Fixed upstream in 26.0.0
Whiteboard: (none) => MGA9TOO
CVE: (none) => CVE-2026-27448, CVE-2026-27459

Comment 1 Nicolas Salguero 2026-03-23 10:21:55 CET
CVE-2026-27448: https://github.com/pyca/pyopenssl/commit/d41a814759a9fb49584ca8ab3f7295de49a85aa0
CVE-2026-27459: https://github.com/pyca/pyopenssl/commit/57f09bb4bb051d3bc2a1abd36e9525313d5cd408

Whiteboard: MGA9TOO => (none)
Flags: affects_mga9+ => (none)
Status comment: Fixed upstream in 26.0.0 => Fixed upstream in 26.0.0 and patches available from upstream
Version: Cauldron => 9
Source RPM: python-openssl-25.0.0-2.mga10.src.rpm, python-openssl-23.0.0-1.mga9.src.rpm => python-openssl-23.0.0-1.mga9.src.rpm

Comment 2 Nicolas Salguero 2026-03-24 14:58:21 CET
Ubuntu has issued an advisory on March 23:
https://ubuntu.com/security/notices/USN-8115-1
Comment 3 Nicolas Salguero 2026-03-24 15:12:58 CET
Suggested advisory:
========================

The updated package fixes security vulnerabilities:

pyOpenSSL allows TLS connection bypass via unhandled callback exception in set_tlsext_servername_callback. (CVE-2026-27448)

pyOpenSSL DTLS cookie callback buffer overflow. (CVE-2026-27459)

References:
https://www.openwall.com/lists/oss-security/2026/03/20/5
https://github.com/pyca/pyopenssl/security/advisories/GHSA-5pwr-322w-8jr4
https://github.com/pyca/pyopenssl/security/advisories/GHSA-vp96-hxj8-p424
https://ubuntu.com/security/notices/USN-8115-1
========================

Updated package in core/updates_testing:
========================
python3-openssl-23.0.0-1.1.mga9

from SRPM:
python-openssl-23.0.0-1.1.mga9.src.rpm

Status comment: Fixed upstream in 26.0.0 and patches available from upstream => (none)
Assignee: bugsquad => qa-bugs
Status: NEW => ASSIGNED

katnatek 2026-03-24 18:51:13 CET

Keywords: (none) => advisory

Comment 4 Herman Viaene 2026-03-27 17:26:57 CET
MGA9-64 server Plasma Wayland on Compaq H000SB.
No installation issues.
Ref bug 11206, but run into problems with the testscript provided.
print statement needs brackets
I had to install python3-httplib2 and change the name of the module to http2, but still then

$ python3 pythonopenssl.py 
Traceback (most recent call last):
  File "/home/tester9/Documents/pythonopenssl.py", line 4, in <module>
    conn = httplib2.HTTPSConnection(HOSTNAME)
AttributeError: module 'httplib2' has no attribute 'HTTPSConnection'
This is beyond me......
script now
#!/usr/bin/python
import httplib2
HOSTNAME = 'login.yahoo.com'
conn = httplib2.HTTPSConnection(HOSTNAME)
conn.putrequest('GET', '/')
conn.endheaders()
response = conn.getresponse()
print (response.read())

CC: (none) => herman.viaene

Comment 5 katnatek 2026-03-31 03:28:21 CEST
The test script is too old 

LC_ALL=C urpmi python3-openssl


installing python3-openssl-23.0.0-1.1.mga9.noarch.rpm from //home/katnatek/qa-testing/x86_64
Preparing...                     ###################################################################################################
      1/1: python3-openssl       ###################################################################################################
      1/1: removing python3-openssl-23.0.0-1.mga9.noarch
                                 ###################################################################################################


Looks that best way to test is tedt if deluge works
I did that

Looks good to me

Flags: (none) => test_passed_mga9_64+
Whiteboard: (none) => MGA9-64-OK

Comment 6 Thomas Andrews 2026-03-31 18:23:38 CEST
Wondering if it would help if Dave's script was updated to python 3, but validating based on comment 5.

CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Comment 7 katnatek 2026-03-31 18:30:17 CEST
(In reply to Thomas Andrews from comment #6)
> Wondering if it would help if Dave's script was updated to python 3, but
> validating based on comment 5.

I did try that with 2to3 but the script still fails
Comment 8 Mageia Robot 2026-04-01 01:07:12 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2026-0074.html

Resolution: (none) => FIXED
Status: ASSIGNED => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.