Debian 10716 Published by

Debian has released security updates for several packages, including python-urllib3 and rails. The python-urllib3 package, which is used for HTTP requests with thread-safe connection pooling, had vulnerabilities that could lead to denial of service or request forgery, but these issues have been resolved in version 1.26.5-1~exp1+deb11u2. Similarly, the Rails web framework had multiple security issues discovered, including command injection and logging of unescaped ANSI sequences, which were addressed in version 2:6.0.3.7+dfsg-2+deb11u4.

Debian GNU/Linux 9 (Stretch) and 10 (Buster) Extended LTS:
ELA-1601-1 python-urllib3 security update

Debian GNU/Linux 11 (Bullseye) LTS:
[DLA 4421-1] python-urllib3 security update
[DLA 4416-1] rails security update




[SECURITY] [DLA 4421-1] python-urllib3 security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-4421-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Guilhem Moulin
December 26, 2025 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : python-urllib3
Version : 1.26.5-1~exp1+deb11u2
CVE ID : CVE-2025-50181 CVE-2025-66418
Debian Bug : 1108076 1122030

Vulnerabilities were found in python-urllib3, an HTTP library with
thread-safe connection pooling for Python, which could lead to denial of
service or request forgery.

CVE-2025-50181

Redirects were not disabled when retries are disabled on PoolManager
instantiation. An application attempting to mitigate SSRF or open
redirect vulnerabilities by disabling redirects at the PoolManager
level remained vulnerable.

CVE-2025-66418

The number of links in the decompression chain was unbounded,
allowing a malicious server to insert a virtually unlimited number
of compression steps which could lead to denial of service.

For Debian 11 bullseye, these problems have been fixed in version
1.26.5-1~exp1+deb11u2.

We recommend that you upgrade your python-urllib3 packages.

For the detailed security status of python-urllib3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python-urllib3

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



ELA-1601-1 python-urllib3 security update


Package : python-urllib3
Version : 1.19.1-1+deb9u4 (stretch), 1.24.1-1+deb10u4 (buster)

Related CVEs :
CVE-2025-50181
CVE-2025-66418

CVE-2025-50181

Redirects were not disabled when retries are disabled on PoolManager
instantiation. An application attempting to mitigate server-side
request forgery (SSRF) or open redirect vulnerabilities by disabling
redirects at the PoolManager level remained vulnerable.

CVE-2025-66418

The number of links in the decompression chain was unbounded,
allowing a malicious server to insert a virtually unlimited number
of compression steps which could lead to denial of service.


ELA-1601-1 python-urllib3 security update



[SECURITY] [DLA 4416-1] rails security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4416-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Bastien Roucari??s
December 21, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : rails
Version : 2:6.0.3.7+dfsg-2+deb11u4
CVE ID : CVE-2025-24293 CVE-2025-55193
Debian Bug : 1111106

Multiple security issues were discovered in the Rails web framework
which could result in command injection or logging of unescaped ANSI
sequences.

For Debian 11 bullseye, these problems have been fixed in version
2:6.0.3.7+dfsg-2+deb11u4.

We recommend that you upgrade your rails packages.

For the detailed security status of rails please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/rails

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS