Debian GNU/Linux 9 (Stretch) and 10 (Buster) Extended LTS:
ELA-1601-1 python-urllib3 security update
Debian GNU/Linux 11 (Bullseye) LTS:
[DLA 4421-1] python-urllib3 security update
[DLA 4416-1] rails security update
[SECURITY] [DLA 4421-1] python-urllib3 security update
-------------------------------------------------------------------------
Debian LTS Advisory DLA-4421-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Guilhem Moulin
December 26, 2025 https://wiki.debian.org/LTS
-------------------------------------------------------------------------
Package : python-urllib3
Version : 1.26.5-1~exp1+deb11u2
CVE ID : CVE-2025-50181 CVE-2025-66418
Debian Bug : 1108076 1122030
Vulnerabilities were found in python-urllib3, an HTTP library with
thread-safe connection pooling for Python, which could lead to denial of
service or request forgery.
CVE-2025-50181
Redirects were not disabled when retries are disabled on PoolManager
instantiation. An application attempting to mitigate SSRF or open
redirect vulnerabilities by disabling redirects at the PoolManager
level remained vulnerable.
CVE-2025-66418
The number of links in the decompression chain was unbounded,
allowing a malicious server to insert a virtually unlimited number
of compression steps which could lead to denial of service.
For Debian 11 bullseye, these problems have been fixed in version
1.26.5-1~exp1+deb11u2.
We recommend that you upgrade your python-urllib3 packages.
For the detailed security status of python-urllib3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python-urllib3
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
ELA-1601-1 python-urllib3 security update
Package : python-urllib3
Version : 1.19.1-1+deb9u4 (stretch), 1.24.1-1+deb10u4 (buster)
Related CVEs :
CVE-2025-50181
CVE-2025-66418
CVE-2025-50181
Redirects were not disabled when retries are disabled on PoolManager
instantiation. An application attempting to mitigate server-side
request forgery (SSRF) or open redirect vulnerabilities by disabling
redirects at the PoolManager level remained vulnerable.
CVE-2025-66418
The number of links in the decompression chain was unbounded,
allowing a malicious server to insert a virtually unlimited number
of compression steps which could lead to denial of service.
ELA-1601-1 python-urllib3 security update
[SECURITY] [DLA 4416-1] rails security update
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4416-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Bastien Roucari??s
December 21, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : rails
Version : 2:6.0.3.7+dfsg-2+deb11u4
CVE ID : CVE-2025-24293 CVE-2025-55193
Debian Bug : 1111106
Multiple security issues were discovered in the Rails web framework
which could result in command injection or logging of unescaped ANSI
sequences.
For Debian 11 bullseye, these problems have been fixed in version
2:6.0.3.7+dfsg-2+deb11u4.
We recommend that you upgrade your rails packages.
For the detailed security status of rails please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/rails
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS