Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-7084-2

Ubuntu Security Notice 7084-2 - USN-7084-1 fixed vulnerability in urllib3. This update provides the corresponding update for the urllib3 module bundled into pip. It was discovered that urllib3 didn’t strip HTTP Proxy-Authorization header on cross-origin redirects. A remote attacker could possibly use this issue to obtain sensitive information.

Packet Storm
#vulnerability#ubuntu#auth

==========================================================================
Ubuntu Security Notice USN-7084-2
October 30, 2024

python-pip vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 24.10
  • Ubuntu 24.04 LTS
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS

Summary:

urllib3 could leak sensitive information.

Software Description:

  • python-pip: Python package installer

Details:

USN-7084-1 fixed vulnerability in urllib3. This update provides the
corresponding update for the urllib3 module bundled into pip.

Original advisory details:

It was discovered that urllib3 didn’t strip HTTP Proxy-Authorization
header on cross-origin redirects. A remote attacker could possibly use
this issue to obtain sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.10
python3-pip 24.2+dfsg-1ubuntu0.1
python3-pip-whl 24.2+dfsg-1ubuntu0.1

Ubuntu 24.04 LTS
python3-pip 24.0+dfsg-1ubuntu1.1
python3-pip-whl 24.0+dfsg-1ubuntu1.1

Ubuntu 22.04 LTS
python3-pip 22.0.2+dfsg-1ubuntu0.5
python3-pip-whl 22.0.2+dfsg-1ubuntu0.5

Ubuntu 20.04 LTS
python-pip-whl 20.0.2-5ubuntu1.11
python3-pip 20.0.2-5ubuntu1.11

Ubuntu 18.04 LTS
python-pip 9.0.1-2.3~ubuntu1.18.04.8+esm6
Available with Ubuntu Pro
python-pip-whl 9.0.1-2.3~ubuntu1.18.04.8+esm6
Available with Ubuntu Pro
python3-pip 9.0.1-2.3~ubuntu1.18.04.8+esm6
Available with Ubuntu Pro

Ubuntu 16.04 LTS
python-pip 8.1.1-2ubuntu0.6+esm10
Available with Ubuntu Pro
python-pip-whl 8.1.1-2ubuntu0.6+esm10
Available with Ubuntu Pro
python3-pip 8.1.1-2ubuntu0.6+esm10
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7084-2
https://ubuntu.com/security/notices/USN-7084-1
CVE-2024-37891

Package Information:
https://launchpad.net/ubuntu/+source/python-pip/24.2+dfsg-1ubuntu0.1
https://launchpad.net/ubuntu/+source/python-pip/24.0+dfsg-1ubuntu1.1
https://launchpad.net/ubuntu/+source/python-pip/22.0.2+dfsg-1ubuntu0.5
https://launchpad.net/ubuntu/+source/python-pip/20.0.2-5ubuntu1.11

Related news

Red Hat Security Advisory 2024-9458-03

Red Hat Security Advisory 2024-9458-03 - An update for python3.11-urllib3 is now available for Red Hat Enterprise Linux 9.

Red Hat Security Advisory 2024-9457-03

Red Hat Security Advisory 2024-9457-03 - An update for python3.12-urllib3 is now available for Red Hat Enterprise Linux 9. Issues addressed include a remote shell upload vulnerability.

Red Hat Security Advisory 2024-8843-03

Red Hat Security Advisory 2024-8843-03 - An update for python3.11-urllib3 is now available for Red Hat Enterprise Linux 8.

Red Hat Security Advisory 2024-8842-03

Red Hat Security Advisory 2024-8842-03 - An update for python3.12-urllib3 is now available for Red Hat Enterprise Linux 8. Issues addressed include a remote shell upload vulnerability.

Ubuntu Security Notice USN-7084-1

Ubuntu Security Notice 7084-1 - It was discovered that urllib3 didn't strip HTTP Proxy-Authorization header on cross-origin redirects. A remote attacker could possibly use this issue to obtain sensitive information.

Red Hat Security Advisory 2024-7312-03

Red Hat Security Advisory 2024-7312-03 - An update is now available for Red Hat Ansible Automation Platform 2.4. Issues addressed include cross site scripting and html injection vulnerabilities.

Red Hat Security Advisory 2024-6358-03

Red Hat Security Advisory 2024-6358-03 - An update for python-urllib3 is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.

Red Hat Security Advisory 2024-6311-03

Red Hat Security Advisory 2024-6311-03 - An update for resource-agents is now available for Red Hat Enterprise Linux 8. Issues addressed include a code execution vulnerability.

Red Hat Security Advisory 2024-6309-03

Red Hat Security Advisory 2024-6309-03 - An update for fence-agents is now available for Red Hat Enterprise Linux 8. Issues addressed include a code execution vulnerability.

Red Hat Security Advisory 2024-6162-03

Red Hat Security Advisory 2024-6162-03 - An update for python-urllib3 is now available for Red Hat Enterprise Linux 9.

Red Hat Security Advisory 2024-5309-03

Red Hat Security Advisory 2024-5309-03 - An update for python-urllib3 is now available for Red Hat Enterprise Linux 8.

Red Hat Security Advisory 2024-4744-03

Red Hat Security Advisory 2024-4744-03 - An update for resource-agents is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.

Red Hat Security Advisory 2024-4422-03

Red Hat Security Advisory 2024-4422-03 - An update for fence-agents is now available for Red Hat Enterprise Linux 9.

GHSA-34jh-p97f-mpxf: urllib3's Proxy-Authorization request header isn't stripped during cross-origin redirects

When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable automatic redirects to achieve safe processing of the `Proxy-...

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution