USN-3990-1: urllib3 vulnerabilities

USN-3990-1: urllib3 vulnerabilities

python-urllib3 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.10
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS

Summary

Several security issues were fixed in urllib3.

Software Description

  • python-urllib3 – HTTP library with thread-safe connection pooling for Python

Details

It was discovered that urllib3 incorrectly removed Authorization HTTP
headers when handled cross-origin redirects. This could result in
credentials being sent to unintended hosts. This issue only affected Ubuntu
16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 18.10. (CVE-2018-20060)

It was discovered that urllib3 incorrectly stripped certain characters from
requests. A remote attacker could use this issue to perform CRLF injection.
(CVE-2019-11236)

It was discovered that urllib3 incorrectly handled situations where a
desired set of CA certificates were specified. This could result in
certificates being accepted by the default CA certificates contrary to
expectatons. This issue only affected Ubuntu 18.04 LTS, Ubuntu 18.10, and
Ubuntu 19.04. (CVE-2019-11324)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
python-urllib31.24.1-1ubuntu0.1
python3-urllib31.24.1-1ubuntu0.1
Ubuntu 18.10
python-urllib31.22-1ubuntu0.18.10.1
python3-urllib31.22-1ubuntu0.18.10.1
Ubuntu 18.04 LTS
python-urllib31.22-1ubuntu0.18.04.1
python3-urllib31.22-1ubuntu0.18.04.1
Ubuntu 16.04 LTS
python-urllib31.13.1-2ubuntu0.16.04.3
python3-urllib31.13.1-2ubuntu0.16.04.3

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

Source: USN-3990-1: urllib3 vulnerabilities

About KENNETH 19694 Articles
지락문화예술공작단

Be the first to comment

Leave a Reply

Your email address will not be published.


*


이 사이트는 스팸을 줄이는 아키스밋을 사용합니다. 댓글이 어떻게 처리되는지 알아보십시오.