<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for python-httplib2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:0796-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-05-26T12:05:23Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-05-26T12:05:23Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-05-26T12:05:23Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for python-httplib2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for python-httplib2 contains the following fixes:

Security fixes included in this update:
- CVE-2021-21240: Fixed a regular expression denial of service via malicious header (bsc#1182053).
- CVE-2020-11078: Fixed an issue where an attacker could change request headers and body (bsc#1171998).

Non security fixes included in this update:
- Update in SLE to 0.19.0 (bsc#1182053, CVE-2021-21240)

- update to 0.19.0:
  * auth: parse headers using pyparsing instead of regexp
  * auth: WSSE token needs to be string not bytes

- update to 0.18.1: (bsc#1171998, CVE-2020-11078)
  * explicit build-backend workaround for pip build isolation bug
  * IMPORTANT security vulnerability CWE-93 CRLF injection
  Force %xx quote of space, CR, LF characters in uri.
  * Ship test suite in source dist

- Update to 0.17.1
  * python3: no_proxy was not checked with https
  * feature: Http().redirect_codes set, works after follow(_all)_redirects check
    This allows one line workaround for old gcloud library that uses 308
    response without redirect semantics.
  * IMPORTANT cache invalidation change, fix 307 keep method, add 308 Redirects
  * proxy: username/password as str compatible with pysocks
  * python2: regression in connect() error handling
  * add support for password protected certificate files
  * feature: Http.close() to clean persistent connections and sensitive data

- Update to 0.14.0:
  * Python3: PROXY_TYPE_SOCKS5 with str user/pass raised TypeError

- version update to 0.13.1
  0.13.1
   * Python3: Use no_proxy
     https://github.com/httplib2/httplib2/pull/140
  0.13.0
    * Allow setting TLS max/min versions
      https://github.com/httplib2/httplib2/pull/138
  0.12.3
    * No changes to library. Distribute py3 wheels.
  0.12.1
    * Catch socket timeouts and clear dead connection
      https://github.com/httplib2/httplib2/issues/18
      https://github.com/httplib2/httplib2/pull/111
    * Officially support Python 3.7 (package metadata)
      https://github.com/httplib2/httplib2/issues/123
  0.12.0
    * Drop support for Python 3.3
    * ca_certs from environment HTTPLIB2_CA_CERTS or certifi
      https://github.com/httplib2/httplib2/pull/117
    * PROXY_TYPE_HTTP with non-empty user/pass raised TypeError: bytes required
      https://github.com/httplib2/httplib2/pull/115
    * Revert http:443-&gt;https workaround
      https://github.com/httplib2/httplib2/issues/112
    * eliminate connection pool read race
      https://github.com/httplib2/httplib2/pull/110
    * cache: stronger safename
      https://github.com/httplib2/httplib2/pull/101
  0.11.3
    * No changes, just reupload of 0.11.2 after fixing automatic release conditions in Travis.
  0.11.2
    * proxy: py3 NameError basestring
      https://github.com/httplib2/httplib2/pull/100
  0.11.1
    * Fix HTTP(S)ConnectionWithTimeout AttributeError proxy_info
      https://github.com/httplib2/httplib2/pull/97
  0.11.0
    * Add DigiCert Global Root G2 serial 033af1e6a711a9a0bb2864b11d09fae5
      https://github.com/httplib2/httplib2/pull/91
    * python3 proxy support
      https://github.com/httplib2/httplib2/pull/90
    * If no_proxy environment value ends with comma then proxy is not used
      https://github.com/httplib2/httplib2/issues/11
    * fix UnicodeDecodeError using socks5 proxy
      https://github.com/httplib2/httplib2/pull/64
    * Respect NO_PROXY env var in proxy_info_from_url
      https://github.com/httplib2/httplib2/pull/58
    * NO_PROXY=bar was matching foobar (suffix without dot delimiter)
      New behavior matches curl/wget:
      - no_proxy=foo.bar will only skip proxy for exact hostname match
      - no_proxy=.wild.card will skip proxy for any.subdomains.wild.card
      https://github.com/httplib2/httplib2/issues/94
    * Bugfix for Content-Encoding: deflate
      https://stackoverflow.com/a/22311297
- deleted patches
  - Removing certifi patch:
    httplib2 started to use certifi and this is already bent to
    use system certificate bundle by another patch

This update was imported from the SUSE:SLE-15:Update update project.
This update was imported from the openSUSE:Leap:15.2:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2021-796</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BX6XMG6VSE6RQ4LZXDDXUYZZZ2FYOQM7/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:0796-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171998</URL>
      <Description>SUSE Bug 1171998</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1182053</URL>
      <Description>SUSE Bug 1182053</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-11078/</URL>
      <Description>SUSE CVE CVE-2020-11078 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21240/</URL>
      <Description>SUSE CVE CVE-2021-21240 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP2">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP2">
        <FullProductName ProductID="SUSE Package Hub 15 SP2">SUSE Package Hub 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="python2-httplib2-0.19.0-bp152.3.3.1">
      <FullProductName ProductID="python2-httplib2-0.19.0-bp152.3.3.1">python2-httplib2-0.19.0-bp152.3.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="python2-httplib2-0.19.0-bp152.3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP2">
      <FullProductName ProductID="SUSE Package Hub 15 SP2:python2-httplib2-0.19.0-bp152.3.3.1">python2-httplib2-0.19.0-bp152.3.3.1 as a component of SUSE Package Hub 15 SP2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In httplib2 before version 0.18.0, an attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server. This vulnerability impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping. This has been fixed in 0.18.0.</Note>
    </Notes>
    <CVE>CVE-2020-11078</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP2:python2-httplib2-0.19.0-bp152.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BX6XMG6VSE6RQ4LZXDDXUYZZZ2FYOQM7/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-11078.html</URL>
        <Description>CVE-2020-11078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171998</URL>
        <Description>SUSE Bug 1171998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">httplib2 is a comprehensive HTTP client library for Python. In httplib2 before version 0.19.0, a malicious server which responds with long series of "\xa0" characters in the "www-authenticate" header may cause Denial of Service (CPU burn while parsing header) of the httplib2 client accessing said server. This is fixed in version 0.19.0 which contains a new implementation of auth headers parsing using the pyparsing library.</Note>
    </Notes>
    <CVE>CVE-2021-21240</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP2:python2-httplib2-0.19.0-bp152.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BX6XMG6VSE6RQ4LZXDDXUYZZZ2FYOQM7/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21240.html</URL>
        <Description>CVE-2021-21240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182053</URL>
        <Description>SUSE Bug 1182053</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
