Description: "Attacker controlling unescaped part of uri for httplib2.Http.request() could change request headers and body, send additional hidden requests to same server. Impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping."
@maintainer(s), please bump to 0.18.0
https://github.com/httplib2/httplib2/commit/a1457cc31f3206cf691d11d2bf34e98865873e9e
ping
We're now at 0.18.1, so let's stabilize it.
amd64 stable
arm stable
ppc stable
ppc64 stable
sparc stable
x86 stable. Maintainer(s), please cleanup. Security, please vote.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=af6175d48cf0285c06e7f4536e9a0b0369910d00 commit af6175d48cf0285c06e7f4536e9a0b0369910d00 Author: Aaron Bauman <bman@gentoo.org> AuthorDate: 2020-06-18 03:15:17 +0000 Commit: Aaron Bauman <bman@gentoo.org> CommitDate: 2020-06-18 03:15:17 +0000 dev-python/httplib2: drop vulnerable Bug: https://bugs.gentoo.org/724362 Signed-off-by: Aaron Bauman <bman@gentoo.org> dev-python/httplib2/Manifest | 2 -- dev-python/httplib2/httplib2-0.13.0.ebuild | 40 ------------------------------ dev-python/httplib2/httplib2-0.17.0.ebuild | 40 ------------------------------ 3 files changed, 82 deletions(-)