Bug 2292788 (CVE-2024-37891) - CVE-2024-37891 urllib3: proxy-authorization request header is not stripped during cross-origin redirects [NEEDINFO]
Summary: CVE-2024-37891 urllib3: proxy-authorization request header is not stripped du...
Keywords:
Status: NEW
Alias: CVE-2024-37891
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2293152 2293153 2293154 2293155 2293157 2293158 2293159 2293160 2293163 2293167 2293169 2293173 2293180 2293181 2293183 2293188 2293189 2293190 2292790 2292791 2292792 2292793 2292794 2292795 2293156 2293161 2293162 2293164 2293165 2293166 2293168 2293170 2293171 2293172 2293174 2293175 2293176 2293177 2293178 2293179 2293182 2293184 2293185 2293186 2293187
Blocks: 2292796
TreeView+ depends on / blocked
 
Reported: 2024-06-17 22:33 UTC by Robb Gatica
Modified: 2025-04-11 10:48 UTC (History)
116 users (show)

Fixed In Version: urllib3 1.26.19, urllib3 2.2.2
Clone Of:
Environment:
Last Closed:
Embargoed:
eddie.rowe: needinfo? (harsh_si)


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2024:6434 0 None None None 2024-09-05 16:37:49 UTC
Red Hat Product Errata RHBA-2024:6658 0 None None None 2024-09-12 15:30:23 UTC
Red Hat Product Errata RHBA-2024:6945 0 None None None 2024-09-23 18:37:21 UTC
Red Hat Product Errata RHBA-2024:6948 0 None None None 2024-09-23 18:55:56 UTC
Red Hat Product Errata RHSA-2024:4422 0 None None None 2024-07-09 10:56:52 UTC
Red Hat Product Errata RHSA-2024:5041 0 None None None 2024-08-06 13:01:18 UTC
Red Hat Product Errata RHSA-2024:5309 0 None None None 2024-08-13 15:27:25 UTC
Red Hat Product Errata RHSA-2024:5526 0 None None None 2024-08-19 06:19:47 UTC
Red Hat Product Errata RHSA-2024:5622 0 None None None 2024-08-20 15:49:52 UTC
Red Hat Product Errata RHSA-2024:5627 0 None None None 2024-08-20 15:47:02 UTC
Red Hat Product Errata RHSA-2024:5633 0 None None None 2024-08-20 16:07:31 UTC
Red Hat Product Errata RHSA-2024:6162 0 None None None 2024-09-03 05:58:16 UTC
Red Hat Product Errata RHSA-2024:6239 0 None None None 2024-09-03 18:14:47 UTC
Red Hat Product Errata RHSA-2024:6240 0 None None None 2024-09-03 18:54:10 UTC
Red Hat Product Errata RHSA-2024:6309 0 None None None 2024-09-04 11:25:06 UTC
Red Hat Product Errata RHSA-2024:6310 0 None None None 2024-09-04 11:09:21 UTC
Red Hat Product Errata RHSA-2024:6311 0 None None None 2024-09-04 11:13:11 UTC
Red Hat Product Errata RHSA-2024:6358 0 None None None 2024-09-04 18:28:12 UTC
Red Hat Product Errata RHSA-2024:6765 0 None None None 2024-09-18 16:04:13 UTC
Red Hat Product Errata RHSA-2024:7312 0 None None None 2024-09-27 04:31:21 UTC
Red Hat Product Errata RHSA-2024:8035 0 None None None 2024-10-14 02:02:09 UTC
Red Hat Product Errata RHSA-2024:8842 0 None None None 2024-11-05 02:41:12 UTC
Red Hat Product Errata RHSA-2024:8843 0 None None None 2024-11-05 02:30:10 UTC
Red Hat Product Errata RHSA-2024:8906 0 None None None 2024-11-05 17:24:39 UTC
Red Hat Product Errata RHSA-2024:9457 0 None None None 2024-11-12 11:12:48 UTC
Red Hat Product Errata RHSA-2024:9458 0 None None None 2024-11-12 11:12:57 UTC
Red Hat Product Errata RHSA-2024:9922 0 None None None 2024-11-19 01:24:20 UTC
Red Hat Product Errata RHSA-2024:9923 0 None None None 2024-11-19 01:22:06 UTC
Red Hat Product Errata RHSA-2024:9985 0 None None None 2024-11-21 09:28:40 UTC

Description Robb Gatica 2024-06-17 22:33:14 UTC
urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests without using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. 

Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable automatic redirects to achieve safe processing of the `Proxy-Authorization` header, but we still decided to strip the header by default in order to further protect users who aren't using the correct approach. 

We believe the number of usages affected by this advisory is low. It requires all of the following to be true to be exploited: 1. Setting the `Proxy-Authorization` header without using urllib3's built-in proxy support. 2. Not disabling HTTP redirects. 3. Either not using an HTTPS origin server or for the proxy or target origin to redirect to a malicious origin. Users are advised to update to either version 1.26.19 or version 2.2.2. Users unable to upgrade may use the `Proxy-Authorization` header with urllib3's `ProxyManager`, disable HTTP redirects using `redirects=False` when sending requests, or not user the `Proxy-Authorization` header as mitigations.

https://github.com/urllib3/urllib3/commit/accff72ecc2f6cf5a76d9570198a93ac7c90270e
https://github.com/urllib3/urllib3/security/advisories/GHSA-34jh-p97f-mpxf

Comment 1 Robb Gatica 2024-06-17 22:41:35 UTC
Created mingw-python-urllib3 tracking bugs for this issue:

Affects: fedora-all [bug 2292791]


Created python-urllib3 tracking bugs for this issue:

Affects: fedora-all [bug 2292790]

Comment 3 Avinash Hanwate 2024-06-20 04:42:15 UTC
Created cascadia-code-fonts tracking bugs for this issue:

Affects: fedora-all [bug 2293160]


Created cura tracking bugs for this issue:

Affects: fedora-all [bug 2293161]


Created docker-compose tracking bugs for this issue:

Affects: epel-all [bug 2293152]
Affects: fedora-all [bug 2293162]


Created duplicity tracking bugs for this issue:

Affects: fedora-all [bug 2293163]


Created google-roboto-mono-fonts tracking bugs for this issue:

Affects: fedora-all [bug 2293164]


Created mote tracking bugs for this issue:

Affects: epel-all [bug 2293153]


Created mrsw-biz-udgothic-fonts tracking bugs for this issue:

Affects: fedora-all [bug 2293165]


Created mrsw-biz-udmincho-fonts tracking bugs for this issue:

Affects: fedora-all [bug 2293166]


Created ndiscover-exo-2-fonts tracking bugs for this issue:

Affects: fedora-all [bug 2293167]


Created oci-cli tracking bugs for this issue:

Affects: fedora-all [bug 2293168]


Created offlineimap tracking bugs for this issue:

Affects: fedora-all [bug 2293169]


Created pipenv tracking bugs for this issue:

Affects: fedora-all [bug 2293170]


Created pypy tracking bugs for this issue:

Affects: fedora-all [bug 2293171]


Created python-WSGIProxy2 tracking bugs for this issue:

Affects: fedora-all [bug 2293172]


Created python-ansible-compat tracking bugs for this issue:

Affects: fedora-all [bug 2293173]


Created python-commoncode tracking bugs for this issue:

Affects: fedora-all [bug 2293174]


Created python-container-inspector tracking bugs for this issue:

Affects: fedora-all [bug 2293175]


Created python-dbus-next tracking bugs for this issue:

Affects: fedora-all [bug 2293176]


Created python-debian-inspector tracking bugs for this issue:

Affects: fedora-all [bug 2293177]


Created python-docker tracking bugs for this issue:

Affects: epel-all [bug 2293154]


Created python-extractcode tracking bugs for this issue:

Affects: fedora-all [bug 2293178]


Created python-ffmpeg-python tracking bugs for this issue:

Affects: fedora-all [bug 2293179]


Created python-flake8-builtins tracking bugs for this issue:

Affects: fedora-all [bug 2293180]


Created python-hvac tracking bugs for this issue:

Affects: epel-all [bug 2293155]


Created python-mercantile tracking bugs for this issue:

Affects: fedora-all [bug 2293181]


Created python-pip tracking bugs for this issue:

Affects: fedora-all [bug 2293182]


Created python-pip-epel tracking bugs for this issue:

Affects: epel-all [bug 2293156]


Created python-play-scraper tracking bugs for this issue:

Affects: fedora-all [bug 2293183]


Created python-plugincode tracking bugs for this issue:

Affects: fedora-all [bug 2293184]


Created python-pygments-better-html tracking bugs for this issue:

Affects: fedora-all [bug 2293185]


Created python-smart-gardena tracking bugs for this issue:

Affects: epel-all [bug 2293157]


Created python-tornado tracking bugs for this issue:

Affects: fedora-all [bug 2293186]


Created python-typecode tracking bugs for this issue:

Affects: fedora-all [bug 2293187]


Created python38-hvac tracking bugs for this issue:

Affects: epel-all [bug 2293158]


Created rst2pdf tracking bugs for this issue:

Affects: fedora-all [bug 2293188]


Created sorkintype-merriweather-fonts tracking bugs for this issue:

Affects: fedora-all [bug 2293189]


Created sorkintype-merriweather-sans-fonts tracking bugs for this issue:

Affects: fedora-all [bug 2293190]


Created transifex-client tracking bugs for this issue:

Affects: epel-all [bug 2293159]

Comment 10 Miro Hrončok 2024-06-20 12:06:36 UTC
Why did you open bugzillas for so many unrelated Fedora and EPEL packages?

Comment 12 Lumír Balhar 2024-06-27 09:16:06 UTC
There is no tracker for python-urllib3 in RHEL 8.

Comment 16 errata-xmlrpc 2024-07-09 10:56:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:4422 https://access.redhat.com/errata/RHSA-2024:4422

Comment 18 Chandra Teja 2024-07-16 14:39:18 UTC
There is no tracker for python-urllib3 in RHEL 8 also there is no update on RHEL 8 , Can any one confirm / Update on this?

Comment 20 errata-xmlrpc 2024-08-06 13:01:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2024:5041 https://access.redhat.com/errata/RHSA-2024:5041

Comment 21 errata-xmlrpc 2024-08-13 15:27:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:5309 https://access.redhat.com/errata/RHSA-2024:5309

Comment 22 Harsh singh 2024-08-14 20:50:54 UTC
what will be the resolution for this CVE-2024-37891, is there any package available for update in red hat 9.4. as my system is on red hat 9.4 but when I tried to update python3-urllib3 it didn't me any updates and currently it's on version 1.26.5-5.

kindly suggest me the resolution in steps possible.

Comment 23 errata-xmlrpc 2024-08-19 06:19:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:5526 https://access.redhat.com/errata/RHSA-2024:5526

Comment 24 Harsh singh 2024-08-19 06:43:53 UTC
(In reply to errata-xmlrpc from comment #23)
> This issue has been addressed in the following products:
> 
>   Red Hat Enterprise Linux 8.8 Extended Update Support
> 
> Via RHSA-2024:5526 https://access.redhat.com/errata/RHSA-2024:5526

But I'm getting this vulnerability in my red hat enterprise Linux 9.4 system for that is there any solution available at the moment....
As if is there any update marked for this package in rhel 9.4 or how can I remidate this vulnerability particularly in rhel 9.4.....

Comment 25 Tomas Orsava 2024-08-19 13:12:20 UTC
(In reply to Harsh singh from comment #24)
> (In reply to errata-xmlrpc from comment #23)
> > This issue has been addressed in the following products:
> > 
> >   Red Hat Enterprise Linux 8.8 Extended Update Support
> > 
> > Via RHSA-2024:5526 https://access.redhat.com/errata/RHSA-2024:5526
> 
> But I'm getting this vulnerability in my red hat enterprise Linux 9.4 system
> for that is there any solution available at the moment....
> As if is there any update marked for this package in rhel 9.4 or how can I
> remidate this vulnerability particularly in rhel 9.4.....

Hi,
I recommend contacting Red Hat support to get a specific answer for RHEL 9.4. I can say that we are committed to fixing this issue in the upcoming RHEL 9.5, I'm not able to comment on RHEL 9.4 at this point.

Comment 28 errata-xmlrpc 2024-08-20 15:46:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2024:5627 https://access.redhat.com/errata/RHSA-2024:5627

Comment 29 errata-xmlrpc 2024-08-20 15:49:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2024:5622 https://access.redhat.com/errata/RHSA-2024:5622

Comment 30 errata-xmlrpc 2024-08-20 16:07:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:5633 https://access.redhat.com/errata/RHSA-2024:5633

Comment 31 errata-xmlrpc 2024-09-03 05:58:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:6162 https://access.redhat.com/errata/RHSA-2024:6162

Comment 32 errata-xmlrpc 2024-09-03 18:14:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2024:6239 https://access.redhat.com/errata/RHSA-2024:6239

Comment 33 errata-xmlrpc 2024-09-03 18:54:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:6240 https://access.redhat.com/errata/RHSA-2024:6240

Comment 34 errata-xmlrpc 2024-09-04 11:09:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2024:6310 https://access.redhat.com/errata/RHSA-2024:6310

Comment 35 errata-xmlrpc 2024-09-04 11:13:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:6311 https://access.redhat.com/errata/RHSA-2024:6311

Comment 36 errata-xmlrpc 2024-09-04 11:25:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:6309 https://access.redhat.com/errata/RHSA-2024:6309

Comment 37 errata-xmlrpc 2024-09-04 18:28:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2024:6358 https://access.redhat.com/errata/RHSA-2024:6358

Comment 40 errata-xmlrpc 2024-09-18 16:04:07 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Automation Platform 2.4 for RHEL 9
  Red Hat Ansible Automation Platform 2.4 for RHEL 8

Via RHSA-2024:6765 https://access.redhat.com/errata/RHSA-2024:6765

Comment 41 errata-xmlrpc 2024-09-27 04:31:14 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Automation Platform 2.4 for RHEL 9
  Red Hat Ansible Automation Platform 2.4 for RHEL 8

Via RHSA-2024:7312 https://access.redhat.com/errata/RHSA-2024:7312

Comment 42 agilmore2 2024-10-09 22:06:49 UTC
Will the RHEL 8 Python 2.7 AppStream version of this library see a patch?

Getting a detection from CVE-2024-37891 on python2-urllib3-1.24.2-4.module+el8.10.0+20444+3bf7fee4.noarch.rpm

Comment 43 Lumír Balhar 2024-10-10 07:22:11 UTC
(In reply to agilmore2 from comment #42)
> Will the RHEL 8 Python 2.7 AppStream version of this library see a patch?
> 
> Getting a detection from CVE-2024-37891 on
> python2-urllib3-1.24.2-4.module+el8.10.0+20444+3bf7fee4.noarch.rpm

Python 2.7 application stream in RHEL 8 is not supported anymore since June 2024.

Comment 45 agilmore2 2024-10-10 15:43:19 UTC

(In reply to Lumír Balhar from comment #43)
> 
> Python 2.7 application stream in RHEL 8 is not supported anymore since June
> 2024.

Thanks for the information!

RHEL 8 LEAPP package depends on python2-requests, which depends on this python2-urllib3 package.

I wouldn't expect LEAPP to be deprecated?

Comment 46 Lumír Balhar 2024-10-11 07:20:52 UTC
(In reply to agilmore2 from comment #45)
> 
> (In reply to Lumír Balhar from comment #43)
> > 
> > Python 2.7 application stream in RHEL 8 is not supported anymore since June
> > 2024.
> 
> Thanks for the information!
> 
> RHEL 8 LEAPP package depends on python2-requests, which depends on this
> python2-urllib3 package.
> 
> I wouldn't expect LEAPP to be deprecated?

I don't know the details here but I see in the sources that leapp is built for Python 3 in RHEL 8 and the latest build does not produce python2- subpackage. What version of RHEL and leapp do you use?

Comment 47 eddie.rowe 2024-10-11 16:05:16 UTC
@harsh_si It looks like RedHat failed to post the info about the update for RHEL 9.4 here for some reason.  If you run the command below you will see the CVE in the change log for RHEL 9.4.

$ yum changelog python3-urllib3.noarch
...
Listing all changelogs
Changelogs for python3-urllib3-1.26.5-5.el9_4.1.noarch
* Tue Jun 18 12:00:00 AM 2024 Tomáš Hrnčiar <thrnciar> - 1.26.5-5.1
- Security fix for CVE-2024-37891
- Backport upstream patch to fix TypeError for http connection if the PoolManager
- is instantiated with server_hostname
Resolves: RHEL-49853

Comment 48 Lumír Balhar 2024-10-11 19:23:15 UTC
(In reply to eddie.rowe from comment #47)
> @harsh_si It looks like RedHat failed to post the info about the
> update for RHEL 9.4 here for some reason.  If you run the command below you
> will see the CVE in the change log for RHEL 9.4.
> 
> $ yum changelog python3-urllib3.noarch
> ...
> Listing all changelogs
> Changelogs for python3-urllib3-1.26.5-5.el9_4.1.noarch
> * Tue Jun 18 12:00:00 AM 2024 Tomáš Hrnčiar <thrnciar> -
> 1.26.5-5.1
> - Security fix for CVE-2024-37891
> - Backport upstream patch to fix TypeError for http connection if the
> PoolManager
> - is instantiated with server_hostname
> Resolves: RHEL-49853

What do you mean by "failed to post the info about the update for RHEL 9.4"? The issue for 9.4 is closed, and the advisory is publicly available: https://access.redhat.com/errata/RHSA-2024:6162

Comment 49 errata-xmlrpc 2024-10-14 02:02:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:8035 https://access.redhat.com/errata/RHSA-2024:8035

Comment 50 agilmore2 2024-10-14 20:41:23 UTC
(In reply to Lumír Balhar from comment #46)
> (In reply to agilmore2 from comment #45)
> > 
> > (In reply to Lumír Balhar from comment #43)
> > > 
> > > Python 2.7 application stream in RHEL 8 is not supported anymore since June
> > > 2024.
> > 
> > Thanks for the information!
> > 
> > RHEL 8 LEAPP package depends on python2-requests, which depends on this
> > python2-urllib3 package.
> > 
> > I wouldn't expect LEAPP to be deprecated?
> 
> I don't know the details here but I see in the sources that leapp is built
> for Python 3 in RHEL 8 and the latest build does not produce python2-
> subpackage. What version of RHEL and leapp do you use?

Ah, this is the RHEL7->8 LEAPP tooling. Since the specific instance has completed the upgrade to RHEL8, they can remove it. Is LEAPP RHEL7->8 still supported? How about with active ELS?

Comment 51 Kaviraj Thangaraj 2024-10-16 19:54:43 UTC
(In reply to Lumír Balhar from comment #48)
> (In reply to eddie.rowe from comment #47)
> > @harsh_si It looks like RedHat failed to post the info about the
> > update for RHEL 9.4 here for some reason.  If you run the command below you
> > will see the CVE in the change log for RHEL 9.4.
> > 
> > $ yum changelog python3-urllib3.noarch
> > ...
> > Listing all changelogs
> > Changelogs for python3-urllib3-1.26.5-5.el9_4.1.noarch
> > * Tue Jun 18 12:00:00 AM 2024 Tomáš Hrnčiar <thrnciar> -
> > 1.26.5-5.1
> > - Security fix for CVE-2024-37891
> > - Backport upstream patch to fix TypeError for http connection if the
> > PoolManager
> > - is instantiated with server_hostname
> > Resolves: RHEL-49853
> 
> What do you mean by "failed to post the info about the update for RHEL 9.4"?
> The issue for 9.4 is closed, and the advisory is publicly available:
> https://access.redhat.com/errata/RHSA-2024:6162

Hi,

We could not see the fix available for RHEL 9.4.

Currently we have installed python3-urllib3.noarch - 1.26.5-5.el9_4.1 and it's reported as vulnerable.

Thanks.

Comment 52 Lumír Balhar 2024-10-17 11:17:26 UTC
(In reply to Kaviraj Thangaraj from comment #51)
> (In reply to Lumír Balhar from comment #48)
> > (In reply to eddie.rowe from comment #47)
> > > @harsh_si It looks like RedHat failed to post the info about the
> > > update for RHEL 9.4 here for some reason.  If you run the command below you
> > > will see the CVE in the change log for RHEL 9.4.
> > > 
> > > $ yum changelog python3-urllib3.noarch
> > > ...
> > > Listing all changelogs
> > > Changelogs for python3-urllib3-1.26.5-5.el9_4.1.noarch
> > > * Tue Jun 18 12:00:00 AM 2024 Tomáš Hrnčiar <thrnciar> -
> > > 1.26.5-5.1
> > > - Security fix for CVE-2024-37891
> > > - Backport upstream patch to fix TypeError for http connection if the
> > > PoolManager
> > > - is instantiated with server_hostname
> > > Resolves: RHEL-49853
> > 
> > What do you mean by "failed to post the info about the update for RHEL 9.4"?
> > The issue for 9.4 is closed, and the advisory is publicly available:
> > https://access.redhat.com/errata/RHSA-2024:6162
> 
> Hi,
> 
> We could not see the fix available for RHEL 9.4.
> 
> Currently we have installed python3-urllib3.noarch - 1.26.5-5.el9_4.1 and
> it's reported as vulnerable.
> 
> Thanks.

Where is the build reported as vulnerable? The Red Hat page about this CVE correctly reports this vulnerability to be fixed in 1.26.5-5.el9_4.1 via advisory RHSA-2024:6162, see: https://access.redhat.com/security/cve/CVE-2024-37891

Comment 53 Lumír Balhar 2024-10-17 11:23:14 UTC
(In reply to agilmore2 from comment #50)
> (In reply to Lumír Balhar from comment #46)
> > (In reply to agilmore2 from comment #45)
> > > 
> > > (In reply to Lumír Balhar from comment #43)
> > > > 
> > > > Python 2.7 application stream in RHEL 8 is not supported anymore since June
> > > > 2024.
> > > 
> > > Thanks for the information!
> > > 
> > > RHEL 8 LEAPP package depends on python2-requests, which depends on this
> > > python2-urllib3 package.
> > > 
> > > I wouldn't expect LEAPP to be deprecated?
> > 
> > I don't know the details here but I see in the sources that leapp is built
> > for Python 3 in RHEL 8 and the latest build does not produce python2-
> > subpackage. What version of RHEL and leapp do you use?
> 
> Ah, this is the RHEL7->8 LEAPP tooling. Since the specific instance has
> completed the upgrade to RHEL8, they can remove it. Is LEAPP RHEL7->8 still
> supported? How about with active ELS?

Answering those questions is out of my scope. Please get in touch with your customer service.

Comment 54 eddie.rowe 2024-10-17 15:58:28 UTC
> What do you mean by "failed to post the info about the update for RHEL 9.4"?
> The issue for 9.4 is closed, and the advisory is publicly available:
> https://access.redhat.com/errata/RHSA-2024:6162

The security advisory indicates the issue was addressed, but many of us would be alerted that our systems were vulnerable due to how Red Hat back ports updates to help us keep stable systems where the version number does not match what the package maintainer may have updated.  So after learning that our systems may still be vulnerable we visited THIS Bugzilla page to try to see if there was additional info that might shed light on things.  In this case there is no mention that the issue was corrected for RHEL 9.4 anywhere.  (Keep in mind that some persons might have just reviewed Bugzilla info and noticed the omission.)

In my case I worked through this when told I failed to patch the server for this issue.  I shared the yum command that I used to confirm the CVE(s) were corrected by the update despite there being no mention of the issue being fixed in this entry on Buzilla.  If someone/something is going to post to Bugzilla that an issue has been corrected, it really needs to mention every version of RHEL that is updated or it risks confusing people.

Comment 55 Lumír Balhar 2024-10-20 17:50:06 UTC
(In reply to eddie.rowe from comment #54)
> > What do you mean by "failed to post the info about the update for RHEL 9.4"?
> > The issue for 9.4 is closed, and the advisory is publicly available:
> > https://access.redhat.com/errata/RHSA-2024:6162
> 
> The security advisory indicates the issue was addressed, but many of us
> would be alerted that our systems were vulnerable due to how Red Hat back
> ports updates to help us keep stable systems where the version number does
> not match what the package maintainer may have updated.  So after learning
> that our systems may still be vulnerable we visited THIS Bugzilla page to
> try to see if there was additional info that might shed light on things.  In
> this case there is no mention that the issue was corrected for RHEL 9.4
> anywhere.  (Keep in mind that some persons might have just reviewed Bugzilla
> info and noticed the omission.)
> 
> In my case I worked through this when told I failed to patch the server for
> this issue.  I shared the yum command that I used to confirm the CVE(s) were
> corrected by the update despite there being no mention of the issue being
> fixed in this entry on Buzilla.  If someone/something is going to post to
> Bugzilla that an issue has been corrected, it really needs to mention every
> version of RHEL that is updated or it risks confusing people.

I understand your point of view but this Bugzilla is for tracking purposes only and should not be used as a source of truth for what was fixed and where. We have release notes, advisories, and CVE pages for that.

If you need more assistance, please contact our customer support.

Comment 56 errata-xmlrpc 2024-11-05 02:30:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:8843 https://access.redhat.com/errata/RHSA-2024:8843

Comment 57 errata-xmlrpc 2024-11-05 02:41:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:8842 https://access.redhat.com/errata/RHSA-2024:8842

Comment 58 errata-xmlrpc 2024-11-05 17:24:32 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.16 for RHEL 8
  Red Hat Satellite 6.16 for RHEL 9

Via RHSA-2024:8906 https://access.redhat.com/errata/RHSA-2024:8906

Comment 59 errata-xmlrpc 2024-11-12 11:12:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:9457 https://access.redhat.com/errata/RHSA-2024:9457

Comment 60 errata-xmlrpc 2024-11-12 11:12:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:9458 https://access.redhat.com/errata/RHSA-2024:9458

Comment 61 errata-xmlrpc 2024-11-19 01:21:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2024:9923 https://access.redhat.com/errata/RHSA-2024:9923

Comment 62 errata-xmlrpc 2024-11-19 01:24:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2024:9922 https://access.redhat.com/errata/RHSA-2024:9922

Comment 63 errata-xmlrpc 2024-11-21 09:28:32 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 17.1 for RHEL 8

Via RHSA-2024:9985 https://access.redhat.com/errata/RHSA-2024:9985


Note You need to log in before you can comment on or make changes to this bug.