{"affected":[{"ecosystem_specific":{"binaries":[{"python2-urllib3":"1.22-lp150.5.3.1","python3-urllib3":"1.22-lp150.5.3.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.0","name":"python-urllib3","purl":"pkg:rpm/opensuse/python-urllib3&distro=openSUSE%20Leap%2015.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.22-lp150.5.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for python-urllib3 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9740: Fixed CRLF injection issue (bsc#1129071).\n- CVE-2019-11324: Fixed invalid CA certificat verification (bsc#1132900).\n- CVE-2019-11236: Fixed CRLF injection via request parameter (bsc#1132663).\n- CVE-2018-20060: Remove Authorization header when redirecting cross-host (bsc#1119376).\n\nThis update was imported from the SUSE:SLE-15:Update update project.","id":"openSUSE-SU-2019:2131-1","modified":"2019-09-14T12:17:04Z","published":"2019-09-14T12:17:04Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KFMC4LRB2CXRSDWEXN4Z4QWZ7YZ6RC4V/#KFMC4LRB2CXRSDWEXN4Z4QWZ7YZ6RC4V"},{"type":"REPORT","url":"https://bugzilla.suse.com/1119376"},{"type":"REPORT","url":"https://bugzilla.suse.com/1129071"},{"type":"REPORT","url":"https://bugzilla.suse.com/1132663"},{"type":"REPORT","url":"https://bugzilla.suse.com/1132900"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-20060"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11236"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11324"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-9740"}],"related":["CVE-2018-20060","CVE-2019-11236","CVE-2019-11324","CVE-2019-9740"],"summary":"Security update for python-urllib3","upstream":["CVE-2018-20060","CVE-2019-11236","CVE-2019-11324","CVE-2019-9740"]}