You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Handle literal control chars in cookie values and address review feedback
- _safe_set_morsel_state now returns bool; callers skip unsalvageable cookies
- Handles both octal-decoded CTL chars and literal CTL chars in raw headers
- Added tests for literal control character edge case (bdraco feedback)
- Updated version wording to reference CVE-2026-3644 patch, not Python 3.13+
- Reworded test docstrings per Dreamsorcerer feedback
Fixed a crash (``CookieError``) in the cookie parser when receiving a cookie containing ASCII control characters on Python 3.13+ (CVE-2026-3644). The parser now gracefully falls back to storing the raw, still-escaped ``coded_value`` without crashing the application.
2
-
-- by :user:`rodrigobnogueira`.
1
+
Fixed a crash (``CookieError``) in the cookie parser when receiving cookies
2
+
containing ASCII control characters on CPython builds with the CVE-2026-3644
3
+
patch. The parser now gracefully falls back to storing the raw, still-escaped
4
+
``coded_value`` when the decoded value contains control characters, and skips
5
+
cookies whose raw header itself contains unsalvageable literal control
0 commit comments