|
|
Log in / Subscribe / Register

Fedora alert FEDORA-2026-8b7270b473 (mingw-python-urllib3)

From:  updates--- via package-announce <package-announce@lists.fedoraproject.org>
To:  package-announce@lists.fedoraproject.org
Subject:  [SECURITY] Fedora 43 Update: mingw-python-urllib3-2.6.3-1.fc43
Date:  Sat, 31 Jan 2026 17:31:55 +0000
Message-ID:  <20260131173155.577A958786@bastion01.rdu3.fedoraproject.org>
Archive-link:  Article

-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2026-8b7270b473 2026-01-31 17:26:56.329339+00:00 -------------------------------------------------------------------------------- Name : mingw-python-urllib3 Product : Fedora 43 Version : 2.6.3 Release : 1.fc43 URL : https://urllib3.readthedocs.io/en/latest/ Summary : MinGW Windows Python urllib3 Description : MinGW Windows Python urllib3. -------------------------------------------------------------------------------- Update Information: Update to 2.6.3, fixes CVE-2025-66471, CVE-2025-21441, CVE-2025-66418. -------------------------------------------------------------------------------- ChangeLog: * Fri Jan 9 2026 Sandro Mani <manisandro@gmail.com> - 2.6.3-1 - Update to 2.6.3 * Sat Dec 13 2025 Sandro Mani <manisandro@gmail.com> - 2.6.2-1 - Update to 2.6.2 * Fri Aug 15 2025 Sandro Mani <manisandro@gmail.com> - 2.5.0-1 - Update to 2.5.0 -------------------------------------------------------------------------------- References: [ 1 ] Bug #2431299 - CVE-2025-66471 mingw-python-urllib3: urllib3 Streaming API improperly handles highly compressed data [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2431299 [ 2 ] Bug #2431302 - CVE-2025-66471 mingw-python-urllib3: urllib3 Streaming API improperly handles highly compressed data [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2431302 [ 3 ] Bug #2431306 - CVE-2026-21441 mingw-python-urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API) [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2431306 [ 4 ] Bug #2431309 - CVE-2026-21441 mingw-python-urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API) [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2431309 [ 5 ] Bug #2431356 - CVE-2025-66418 mingw-python-urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2431356 [ 6 ] Bug #2431358 - CVE-2025-66418 mingw-python-urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2431358 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2026-8b7270b473' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgr... All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- -- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-cond... List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-ann... Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds