First published: Mon Oct 05 2020(Updated: )
It was discovered that urllib3 incorrectly handled certain character sequences. A remote attacker could possibly use this issue to perform CRLF injection.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python3-urllib3 | <1.25.8-2ubuntu0.1 | 1.25.8-2ubuntu0.1 |
=20.04 | ||
All of | ||
ubuntu/python-urllib3 | <1.22-1ubuntu0.18.04.2 | 1.22-1ubuntu0.18.04.2 |
=18.04 | ||
All of | ||
ubuntu/python3-urllib3 | <1.22-1ubuntu0.18.04.2 | 1.22-1ubuntu0.18.04.2 |
=18.04 | ||
All of | ||
ubuntu/python-urllib3 | <1.13.1-2ubuntu0.16.04.4 | 1.13.1-2ubuntu0.16.04.4 |
=16.04 | ||
All of | ||
ubuntu/python3-urllib3 | <1.13.1-2ubuntu0.16.04.4 | 1.13.1-2ubuntu0.16.04.4 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4570-1 is moderate.
The urllib3 vulnerability could allow a remote attacker to perform CRLF injection.
Ubuntu 16.04, 18.04, and 20.04 are affected by USN-4570-1.
To fix the urllib3 vulnerability on Ubuntu 20.04, upgrade the python3-urllib3 package to version 1.25.8-2ubuntu0.1 or higher.
You can find more information about the urllib3 vulnerability on the Ubuntu Security Advisory USN-4570-1 page.