UbuntuUpdates.org

Package "python-urllib3"

Name: python-urllib3

Description:

HTTP library with thread-safe connection pooling for Python

Latest version: 1.22-1ubuntu0.18.04.2
Release: bionic (18.04)
Level: updates
Repository: main
Homepage: http://urllib3.readthedocs.org

Links


Download "python-urllib3"


Other versions of "python-urllib3" in Bionic

Repository Area Version
base main 1.22-1
security main 1.22-1ubuntu0.18.04.2

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1.22-1ubuntu0.18.04.2 2020-10-05 19:07:02 UTC

  python-urllib3 (1.22-1ubuntu0.18.04.2) bionic-security; urgency=medium

  * SECURITY UPDATE: CRLF injection via method parameter
    - debian/patches/CVE-2020-26137.patch: raise ValueError if method
      contains control characters in urllib3/connection.py,
      test/with_dummyserver/test_connectionpool.py.
    - CVE-2020-26137

 -- Marc Deslauriers <email address hidden> Thu, 01 Oct 2020 14:00:15 -0400

Source diff to previous version
CVE-2020-26137 urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characte

Version: 1.22-1ubuntu0.18.04.1 2019-05-21 14:07:10 UTC

  python-urllib3 (1.22-1ubuntu0.18.04.1) bionic-security; urgency=medium

  * SECURITY UPDATE: credential disclosure via cross-origin redirect
    - debian/patches/CVE-2018-20060-*.patch: backport logic to strip
      Authorization header when following a cross-origin redirect.
    - CVE-2018-20060
  * SECURITY UPDATE: CRLF injection issue
    - debian/patches/CVE-2019-11236-1.patch: check for control chars in URL
      in urllib3/connection.py, urllib3/connectionpool.py,
      urllib3/contrib/pyopenssl.py, urllib3/contrib/socks.py,
      urllib3/util/url.py, test/test_util.py.
    - debian/patches/CVE-2019-11236-2.patch: percent-encode invalid target
      characters in urllib3/util/url.py, test/test_util.py.
    - debian/patches/CVE-2019-11236-3.patch: don't use embedded python-six
      in urllib3/util/url.py.
    - CVE-2019-11236
  * SECURITY UPDATE: CA cert mishandling
    - debian/patches/CVE-2019-11324.patch: don't load system certificates
      by default when any other CA cert parameters are specified in
      urllib3/util/ssl_.py.
    - CVE-2019-11324
  * debian/patches/fix_cert_error.patch: fix failing test.

 -- Marc Deslauriers <email address hidden> Mon, 13 May 2019 14:27:58 -0400

CVE-2018-20060 urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in ho
CVE-2019-11236 In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.
CVE-2019-11324 The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA c



About   -   Send Feedback to @ubuntu_updates