Описание
Security update for python-httplib2
This update for python-httplib2 contains the following fixes:
Security fixes included in this update:
- CVE-2021-21240: Fixed a regular expression denial of service via malicious header (bsc#1182053).
- CVE-2020-11078: Fixed an issue where an attacker could change request headers and body (bsc#1171998).
Non security fixes included in this update:
-
Update in SLE to 0.19.0 (bsc#1182053, CVE-2021-21240)
-
update to 0.19.0:
- auth: parse headers using pyparsing instead of regexp
- auth: WSSE token needs to be string not bytes
-
update to 0.18.1: (bsc#1171998, CVE-2020-11078)
- explicit build-backend workaround for pip build isolation bug
- IMPORTANT security vulnerability CWE-93 CRLF injection Force %xx quote of space, CR, LF characters in uri.
- Ship test suite in source dist
-
Update to 0.17.1
- python3: no_proxy was not checked with https
- feature: Http().redirect_codes set, works after follow(_all)_redirects check This allows one line workaround for old gcloud library that uses 308 response without redirect semantics.
- IMPORTANT cache invalidation change, fix 307 keep method, add 308 Redirects
- proxy: username/password as str compatible with pysocks
- python2: regression in connect() error handling
- add support for password protected certificate files
- feature: Http.close() to clean persistent connections and sensitive data
-
Update to 0.14.0:
- Python3: PROXY_TYPE_SOCKS5 with str user/pass raised TypeError
-
version update to 0.13.1 0.13.1
- Python3: Use no_proxy https://github.com/httplib2/httplib2/pull/140 0.13.0
- Allow setting TLS max/min versions https://github.com/httplib2/httplib2/pull/138 0.12.3
- No changes to library. Distribute py3 wheels. 0.12.1
- Catch socket timeouts and clear dead connection https://github.com/httplib2/httplib2/issues/18 https://github.com/httplib2/httplib2/pull/111
- Officially support Python 3.7 (package metadata) https://github.com/httplib2/httplib2/issues/123 0.12.0
- Drop support for Python 3.3
- ca_certs from environment HTTPLIB2_CA_CERTS or certifi https://github.com/httplib2/httplib2/pull/117
- PROXY_TYPE_HTTP with non-empty user/pass raised TypeError: bytes required https://github.com/httplib2/httplib2/pull/115
- Revert http:443->https workaround https://github.com/httplib2/httplib2/issues/112
- eliminate connection pool read race https://github.com/httplib2/httplib2/pull/110
- cache: stronger safename https://github.com/httplib2/httplib2/pull/101 0.11.3
- No changes, just reupload of 0.11.2 after fixing automatic release conditions in Travis. 0.11.2
- proxy: py3 NameError basestring https://github.com/httplib2/httplib2/pull/100 0.11.1
- Fix HTTP(S)ConnectionWithTimeout AttributeError proxy_info https://github.com/httplib2/httplib2/pull/97 0.11.0
- Add DigiCert Global Root G2 serial 033af1e6a711a9a0bb2864b11d09fae5 https://github.com/httplib2/httplib2/pull/91
- python3 proxy support https://github.com/httplib2/httplib2/pull/90
- If no_proxy environment value ends with comma then proxy is not used https://github.com/httplib2/httplib2/issues/11
- fix UnicodeDecodeError using socks5 proxy https://github.com/httplib2/httplib2/pull/64
- Respect NO_PROXY env var in proxy_info_from_url https://github.com/httplib2/httplib2/pull/58
- NO_PROXY=bar was matching foobar (suffix without dot delimiter)
New behavior matches curl/wget:
- no_proxy=foo.bar will only skip proxy for exact hostname match
- no_proxy=.wild.card will skip proxy for any.subdomains.wild.card https://github.com/httplib2/httplib2/issues/94
- Bugfix for Content-Encoding: deflate https://stackoverflow.com/a/22311297
-
deleted patches
- Removing certifi patch: httplib2 started to use certifi and this is already bent to use system certificate bundle by another patch
Список пакетов
SUSE Linux Enterprise Module for Public Cloud 15
Ссылки
- Link for SUSE-SU-2021:1637-1
- E-Mail link for SUSE-SU-2021:1637-1
- SUSE Security Ratings
- SUSE Bug 1171998
- SUSE Bug 1182053
- SUSE CVE CVE-2020-11078 page
- SUSE CVE CVE-2021-21240 page
Описание
In httplib2 before version 0.18.0, an attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server. This vulnerability impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping. This has been fixed in 0.18.0.
Затронутые продукты
Ссылки
- CVE-2020-11078
- SUSE Bug 1171998
Описание
httplib2 is a comprehensive HTTP client library for Python. In httplib2 before version 0.19.0, a malicious server which responds with long series of "\xa0" characters in the "www-authenticate" header may cause Denial of Service (CPU burn while parsing header) of the httplib2 client accessing said server. This is fixed in version 0.19.0 which contains a new implementation of auth headers parsing using the pyparsing library.
Затронутые продукты
Ссылки
- CVE-2021-21240
- SUSE Bug 1182053