Source: python-urllib3 Version: 2.3.0-2 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for python-urllib3. CVE-2025-50182[0]: | urllib3 is a user-friendly HTTP client library for Python. Prior to | 2.5.0, urllib3 does not control redirects in browsers and Node.js. | urllib3 supports being used in a Pyodide runtime utilizing the | JavaScript Fetch API or falling back on XMLHttpRequest. This means | Python libraries can be used to make HTTP requests from a browser or | Node.js. Additionally, urllib3 provides a mechanism to control | redirects, but the retries and redirect parameters are ignored with | Pyodide; the runtime itself determines redirect behavior. This issue | has been patched in version 2.5.0. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-50182 https://www.cve.org/CVERecord?id=CVE-2025-50182 [1] https://github.com/urllib3/urllib3/security/advisories/GHSA-48p4-8xcf-vxj5 [2] https://github.com/urllib3/urllib3/commit/7eb4a2aafe49a279c29b6d1f0ed0f42e9736194f Please adjust the affected versions in the BTS as needed. Regards, Salvatore