Cybersecurity

Python Releases Security Updates for Versions 3.9 Through 3.12

2026-05-01 17:12:44

Overview of the Security Releases

Python has published new maintenance and security releases for its older yet widely used versions: 3.12.12, 3.11.14, 3.10.19, and 3.9.24. These updates focus on patching critical vulnerabilities in core libraries, including XML parsing, archive handling, and HTML parsing. While the latest Python 3.14.0 development branch gets attention, these releases ensure that the vast ecosystem of applications relying on stable versions remains secure.

Python Releases Security Updates for Versions 3.9 Through 3.12

Key Security Fixes Across All Versions

XML-Related Fixes

Two important XML security issues were addressed:

Archive-Related Fixes

Two improvements in archive file validation prevent malicious archives from exploiting Python’s extraction logic:

HTML Parsing Fixes (gh-135661 and related)

The HTML parser (html.parser.HTMLParser) now conforms more closely to the HTML5 standard. A series of changes fix edge cases that could be exploited for denial of service or information leakage:

Specific Version Updates

Python 3.12.12

This release incorporates all the generic fixes described above plus version‐specific improvements. Download from the official Python 3.12.12 download page.

Python 3.11.14

In addition to the shared XML, archive, and HTML fixes, this version includes an important update:

Get the release from the Python downloads page.

Python 3.10.19

Version 3.10.19 contains the same core security patches as above. Check the Python 3.10.19 download page.

Python 3.9.24

Python 3.9.24 also benefits from all the shared fixes. Download from Python 3.9.24 download page.

Conclusion

While newer Python versions may attract more buzz, these security releases for versions 3.9 through 3.12 provide critical safeguards for production systems. Administrators and developers are strongly encouraged to upgrade promptly, especially to protect against the HTML parser vulnerability that could be exploited with crafted web content.

Explore

How the U.S. Military Transitioned 3,600 Homes to Geothermal Energy: A Step-by-Step Guide How to Identify and Prosecute Ransomware Leaders: Lessons from the UNKN Case States Double EV Charging Infrastructure Progress but Still Fall Short, Sierra Club Report Reveals Lessons from the 1970s Oil Shocks: What a Strait of Hormuz Blockade Means for Global Energy Build and Deploy a GPS-Free Drone Navigation System with GhostPilot