Skip to content
This repository has been archived by the owner on Aug 18, 2021. It is now read-only.

[Security] Bump urllib3 from 1.25.7 to 1.25.11 #379

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

dependabot-preview[bot]
Copy link
Contributor

Bumps urllib3 from 1.25.7 to 1.25.11.

Release notes

Sourced from urllib3's releases.

1.25.10

Release: 1.25.10

1.25.9

No release notes provided.

1.25.8

Release: 1.25.8

Changelog

Sourced from urllib3's changelog.

1.25.11 (2020-10-19)

  • Fix retry backoff time parsed from Retry-After header when given in the HTTP date format. The HTTP date was parsed as the local timezone rather than accounting for the timezone in the HTTP date (typically UTC) (Pull #1932, Pull #1935, Pull #1938, Pull #1949)
  • Fix issue where an error would be raised when the SSLKEYLOGFILE environment variable was set to the empty string. Now SSLContext.keylog_file is not set in this situation (Pull #2016)

1.25.10 (2020-07-22)

  • Added support for SSLKEYLOGFILE environment variable for logging TLS session keys with use with programs like Wireshark for decrypting captured web traffic (Pull #1867)
  • Fixed loading of SecureTransport libraries on macOS Big Sur due to the new dynamic linker cache (Pull #1905)
  • Collapse chunked request bodies data and framing into one call to send() to reduce the number of TCP packets by 2-4x (Pull #1906)
  • Don't insert None into ConnectionPool if the pool was empty when requesting a connection (Pull #1866)
  • Avoid hasattr call in BrotliDecoder.decompress() (Pull #1858)

1.25.9 (2020-04-16)

  • Added InvalidProxyConfigurationWarning which is raised when erroneously specifying an HTTPS proxy URL. urllib3 doesn't currently support connecting to HTTPS proxies but will soon be able to and we would like users to migrate properly without much breakage.

    See this GitHub issue for more information on how to fix your proxy config. (Pull #1851)

  • Drain connection after PoolManager redirect (Pull #1817)

  • Ensure load_verify_locations raises SSLError for all backends (Pull #1812)

  • Rename VerifiedHTTPSConnection to HTTPSConnection (Pull #1805)

  • Allow the CA certificate data to be passed as a string (Pull #1804)

  • Raise ValueError if method contains control characters (Pull #1800)

  • Add __repr__ to Timeout (Pull #1795)

1.25.8 (2020-01-20)

  • Drop support for EOL Python 3.4 (Pull #1774)
  • Optimize _encode_invalid_chars (Pull #1787)
Commits
  • 9b95f29 Release: 1.25.11
  • 37664c9 [1.25] Upgrade pytest-freezegun to 0.4.2
  • 85a809c [1.25] Parse UTC for 'Retry-After' redirect handler
  • 785b901 [1.25] Always assume UTC if no timezone in Retry-After
  • 9a2c158 [1.25] Use tz-aware functions in Retry.parse_retry_after()
  • 747e9aa [1.25.x] Don't set keylog_filename for empty values
  • 9c54745 [1.25] Black 20.8b1 styling
  • 06fff01 [1.25] Check README.rst and CHANGES.rst are valid reST
  • 957edcc [1.25] Remove raw reST directive from README
  • 15487c7 [1.25] Migrate Windows CI to GitHub Actions
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
  • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
  • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
  • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
  • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language
  • @dependabot badge me will comment on this PR with code to add a "Dependabot enabled" badge to your readme

Additionally, you can set the following in your Dependabot dashboard:

  • Update frequency (including time of day and day of week)
  • Pull request limits (per update run and/or open at any time)
  • Automerge options (never/patch/minor, and dev/runtime dependencies)
  • Out-of-range updates (receive only lockfile updates, if desired)
  • Security updates (receive only security updates, if desired)

Bumps [urllib3](https://github.com/urllib3/urllib3) from 1.25.7 to 1.25.11.
- [Release notes](https://github.com/urllib3/urllib3/releases)
- [Changelog](https://github.com/urllib3/urllib3/blob/master/CHANGES.rst)
- [Commits](urllib3/urllib3@1.25.7...1.25.11)

Signed-off-by: dependabot-preview[bot] <support@dependabot.com>
@dependabot-preview
Copy link
Contributor Author

We've just been alerted that this update fixes a security vulnerability:

Sourced from The GitHub Security Advisory Database.

Uncontrolled Resource Consumption in urllib3

The _encode_invalid_chars function in util/url.py in the urllib3 library 1.25.2 through 1.25.7 for Python allows a denial of service (CPU consumption) because of an inefficient algorithm. The percent_encodings array contains all matches of percent encodings. It is not deduplicated. For a URL of length N, the size of percent_encodings may be up to O(N). The next step (normalize existing percent-encoded bytes) also takes up to O(N) for each step, so the total time is O(N^2). If percent_encodings were deduplicated, the time to compute _encode_invalid_chars would be O(kN), where k is at most 484 ((10+6*2)^2).

Affected versions: [">= 1.25.2, <= 1.25.7"]

@dependabot-preview dependabot-preview bot changed the title Bump urllib3 from 1.25.7 to 1.25.11 [Security] Bump urllib3 from 1.25.7 to 1.25.11 Apr 30, 2021
@dependabot-preview dependabot-preview bot added the security Pull requests that address a security vulnerability label Apr 30, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
dependencies security Pull requests that address a security vulnerability
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants