Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2021:1637-1)
Summary:The remote host is missing an update for the 'python-httplib2' package(s) announced via the SUSE-SU-2021:1637-1 advisory.
The remote host is missing an update for the 'python-httplib2' package(s) announced via the SUSE-SU-2021:1637-1 advisory.

Vulnerability Insight:
This update for python-httplib2 contains the following fixes:

Security fixes included in this update:
CVE-2021-21240: Fixed a regular expression denial of service via
malicious header (bsc#1182053).

CVE-2020-11078: Fixed an issue where an attacker could change request
headers and body (bsc#1171998).

Non security fixes included in this update:
Update in SLE to 0.19.0 (bsc#1182053, CVE-2021-21240)

update to 0.19.0:
* auth: parse headers using pyparsing instead of regexp
* auth: WSSE token needs to be string not bytes

update to 0.18.1: (bsc#1171998, CVE-2020-11078)
* explicit build-backend workaround for pip build isolation bug
* IMPORTANT security vulnerability CWE-93 CRLF injection Force %xx quote
of space, CR, LF characters in uri.
* Ship test suite in source dist

Update to 0.17.1
* python3: no_proxy was not checked with https
* feature: Http().redirect_codes set, works after follow(_all)_redirects
check This allows one line workaround for old gcloud library that uses
308 response without redirect semantics.
* IMPORTANT cache invalidation change, fix 307 keep method, add 308
* proxy: username/password as str compatible with pysocks
* python2: regression in connect() error handling
* add support for password protected certificate files
* feature: Http.close() to clean persistent connections and sensitive

Update to 0.14.0:
* Python3: PROXY_TYPE_SOCKS5 with str user/pass raised TypeError

version update to 0.13.1 0.13.1
* Python3: Use no_proxy [link moved to references]
* Allow setting TLS max/min versions
[link moved to references] 0.12.3
* No changes to library. Distribute py3 wheels. 0.12.1
* Catch socket timeouts and clear dead connection
[link moved to references]
[link moved to references]
* Officially support Python 3.7 (package metadata)
[link moved to references] 0.12.0
* Drop support for Python 3.3
* ca_certs from environment HTTPLIB2_CA_CERTS or certifi
[link moved to references]
* PROXY_TYPE_HTTP with non-empty user/pass raised TypeError: bytes
required [link moved to references]
* Revert http:443->https workaround
[link moved to references]
* eliminate connection pool read race
[link moved to references]
* cache: stronger safename
[link moved to references] 0.11.3
* No changes, just reupload of 0.11.2 after fixing automatic release
conditions in Travis. 0.11.2
* proxy: py3 NameError basestring
[link moved to references] 0.11.1
* Fix HTTP(S)ConnectionWithTimeout AttributeError proxy_info
[link moved to references] 0.11.0
* Add DigiCert Global Root G2 serial 033af1e6a711a9a0bb2864b11d09fae5
[link moved to references]
* python3 proxy support h... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'python-httplib2' package(s) on SUSE Linux Enterprise Module for Public Cloud 15

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-11078
Common Vulnerability Exposure (CVE) ID: CVE-2021-21240
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.