Package "python-urllib3"
Name: |
python-urllib3
|
Description: |
HTTP library with thread-safe connection pooling for Python
|
Latest version: |
1.22-1ubuntu0.18.04.2 |
Release: |
bionic (18.04) |
Level: |
updates |
Repository: |
main |
Homepage: |
http://urllib3.readthedocs.org |
Links
Download "python-urllib3"
Other versions of "python-urllib3" in Bionic
Packages in group
Deleted packages are displayed in grey.
Changelog
python-urllib3 (1.22-1ubuntu0.18.04.2) bionic-security; urgency=medium
* SECURITY UPDATE: CRLF injection via method parameter
- debian/patches/CVE-2020-26137.patch: raise ValueError if method
contains control characters in urllib3/connection.py,
test/with_dummyserver/test_connectionpool.py.
- CVE-2020-26137
-- Marc Deslauriers <email address hidden> Thu, 01 Oct 2020 14:00:15 -0400
|
Source diff to previous version |
CVE-2020-26137 |
urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characte |
|
python-urllib3 (1.22-1ubuntu0.18.04.1) bionic-security; urgency=medium
* SECURITY UPDATE: credential disclosure via cross-origin redirect
- debian/patches/CVE-2018-20060-*.patch: backport logic to strip
Authorization header when following a cross-origin redirect.
- CVE-2018-20060
* SECURITY UPDATE: CRLF injection issue
- debian/patches/CVE-2019-11236-1.patch: check for control chars in URL
in urllib3/connection.py, urllib3/connectionpool.py,
urllib3/contrib/pyopenssl.py, urllib3/contrib/socks.py,
urllib3/util/url.py, test/test_util.py.
- debian/patches/CVE-2019-11236-2.patch: percent-encode invalid target
characters in urllib3/util/url.py, test/test_util.py.
- debian/patches/CVE-2019-11236-3.patch: don't use embedded python-six
in urllib3/util/url.py.
- CVE-2019-11236
* SECURITY UPDATE: CA cert mishandling
- debian/patches/CVE-2019-11324.patch: don't load system certificates
by default when any other CA cert parameters are specified in
urllib3/util/ssl_.py.
- CVE-2019-11324
* debian/patches/fix_cert_error.patch: fix failing test.
-- Marc Deslauriers <email address hidden> Mon, 13 May 2019 14:27:58 -0400
|
CVE-2018-20060 |
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in ho |
CVE-2019-11236 |
In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter. |
CVE-2019-11324 |
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA c |
|
About
-
Send Feedback to @ubuntu_updates