Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security] Bump urllib3 from 1.22 to 1.24.2 #7

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

dependabot-preview[bot]
Copy link
Contributor

@dependabot-preview dependabot-preview bot commented Oct 24, 2019

Bumps urllib3 from 1.22 to 1.24.2. This update includes security fixes.

Vulnerabilities fixed

Sourced from The GitHub Security Advisory Database.

High severity vulnerability that affects urllib3
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument.

Affected versions: < 1.24.2

Sourced from The GitHub Security Advisory Database.

High severity vulnerability that affects urllib3
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.

Affected versions: < 1.23

Changelog

Sourced from urllib3's changelog.

1.24.2 (2019-04-17)

  • Don't load system certificates by default when any other ca_certs, ca_certs_dir or ssl_context parameters are specified.
  • Remove Authorization header regardless of case when redirecting to cross-site. (Issue #1510)
  • Add support for IPv6 addresses in subjectAltName section of certificates. (Issue #1269)

1.24.1 (2018-11-02)

  • Remove quadratic behavior within GzipDecoder.decompress() (Issue #1467)
  • Restored functionality of ciphers parameter for create_urllib3_context(). (Issue #1462)

1.24 (2018-10-16)

  • Allow key_server_hostname to be specified when initializing a PoolManager to allow custom SNI to be overridden. (Pull #1449)
  • Test against Python 3.7 on AppVeyor. (Pull #1453)
  • Early-out ipv6 checks when running on App Engine. (Pull #1450)
  • Change ambiguous description of backoff_factor (Pull #1436)
  • Add ability to handle multiple Content-Encodings (Issue #1441 and Pull #1442)
  • Skip DNS names that can't be idna-decoded when using pyOpenSSL (Issue #1405).
  • Add a server_hostname parameter to HTTPSConnection which allows for overriding the SNI hostname sent in the handshake. (Pull #1397)
  • Drop support for EOL Python 2.6 (Pull #1429 and Pull #1430)
  • Fixed bug where responses with header Content-Type: message/* erroneously raised HeaderParsingError, resulting in a warning being logged. (Pull #1439)
  • Move urllib3 to src/urllib3 (Pull #1409)

1.23 (2018-06-04)

  • Allow providing a list of headers to strip from requests when redirecting to a different host. Defaults to the Authorization header. Different headers can be set via Retry.remove_headers_on_redirect. (Issue #1316)
  • Fix util.selectors._fileobj_to_fd to accept long (Issue #1247).
  • Dropped Python 3.3 support. (Pull #1242)
  • Put the connection back in the pool when calling stream() or read_chunked() on a chunked HEAD response. (Issue #1234)
  • Fixed pyOpenSSL-specific ssl client authentication issue when clients attempted to auth via certificate + chain (Issue #1060)
  • Add the port to the connectionpool connect print (Pull #1251)
  • Don't use the uuid module to create multipart data boundaries. (Pull #1380)
  • read_chunked() on a closed response returns no chunks. (Issue #1088)
  • Add Python 2.6 support to contrib.securetransport (Pull #1359)
  • Added support for auth info in url for SOCKS proxy (Pull #1363)
Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
  • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
  • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
  • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
  • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language
  • @dependabot badge me will comment on this PR with code to add a "Dependabot enabled" badge to your readme

Additionally, you can set the following in your Dependabot dashboard:

  • Update frequency (including time of day and day of week)
  • Pull request limits (per update run and/or open at any time)
  • Out-of-range updates (receive only lockfile updates, if desired)
  • Security updates (receive only security updates, if desired)

@dependabot-preview dependabot-preview bot added dependencies Pull requests that update a dependency file security Pull requests that address a security vulnerability labels Oct 24, 2019
Bumps [urllib3](https://github.com/urllib3/urllib3) from 1.22 to 1.24.2. **This update includes security fixes.**
- [Release notes](https://github.com/urllib3/urllib3/releases)
- [Changelog](https://github.com/urllib3/urllib3/blob/master/CHANGES.rst)
- [Commits](urllib3/urllib3@1.22...1.24.2)

Signed-off-by: dependabot-preview[bot] <[email protected]>
@dependabot-preview dependabot-preview bot force-pushed the dependabot/pip/urllib3-1.24.2 branch from 30e1b56 to 03ca366 Compare June 27, 2020 16:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file security Pull requests that address a security vulnerability
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants