ALT-PU-2025-15529-5
Package python3-module-urllib3 updated to version 2.6.1-alt1 for branch p11 in task 402292.
Closed vulnerabilities
BDU:2025-09780
Уязвимость HTTP библиотеки Urllib3 языка программирования Python, связанная с переадресацией URL на ненадежный сайт, позволяющая нарушителю перенаправлять пользователей на произвольный URL-адрес
Modified: 2026-04-20
BDU:2025-09791
Уязвимость HTTP библиотеки Urllib3 языка программирования Python, связанная с переадресацией URL на ненадежный сайт, позволяющая нарушителю перенаправлять пользователей на произвольный URL-адрес
Modified: 2026-04-20
BDU:2026-02927
Уязвимость HTTP библиотеки для Python Urllib3, связанная с выделением неограниченной памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-04-20
BDU:2026-03452
Уязвимость HTTP библиотеки Urllib3 языка программирования Python, связанная с некорректной обработкой сильно сжатых входных данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-12-22
CVE-2025-50181
urllib3 is a user-friendly HTTP client library for Python. Prior to 2.5.0, it is possible to disable redirects for all requests by instantiating a PoolManager and specifying retries in a way that disable redirects. By default, requests and botocore users are not affected. An application attempting to mitigate SSRF or open redirect vulnerabilities by disabling redirects at the PoolManager level will remain vulnerable. This issue has been patched in version 2.5.0.
Modified: 2025-12-22
CVE-2025-50182
urllib3 is a user-friendly HTTP client library for Python. Starting in version 2.2.0 and prior to 2.5.0, urllib3 does not control redirects in browsers and Node.js. urllib3 supports being used in a Pyodide runtime utilizing the JavaScript Fetch API or falling back on XMLHttpRequest. This means Python libraries can be used to make HTTP requests from a browser or Node.js. Additionally, urllib3 provides a mechanism to control redirects, but the retries and redirect parameters are ignored with Pyodide; the runtime itself determines redirect behavior. This issue has been patched in version 2.5.0.
Modified: 2025-12-10
CVE-2025-66418
urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.
Modified: 2025-12-10
CVE-2025-66471
urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.
Modified: 2025-12-05
GHSA-2xpw-w6gg-jr37
urllib3 streaming API improperly handles highly compressed data
Modified: 2025-12-22
GHSA-48p4-8xcf-vxj5
urllib3 does not control redirects in browsers and Node.js
Modified: 2025-12-05
GHSA-gm62-xv2j-4w53
urllib3 allows an unbounded number of links in the decompression chain
Modified: 2025-12-23
GHSA-pq67-6m6q-mj2v
urllib3 redirects are not disabled when retries are disabled on PoolManager instantiation
