86f86a724b
Fixes the following security vulnerability: CVE-2019-9740: An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
6 lines
330 B
Plaintext
6 lines
330 B
Plaintext
# md5, sha256 from https://pypi.org/pypi/urllib3/json
|
|
md5 1efcddca675b80f3ac110439921fc66b urllib3-1.24.3.tar.gz
|
|
sha256 2393a695cd12afedd0dcb26fe5d50d0cf248e5a66f75dbd89a3d4eb333a61af4 urllib3-1.24.3.tar.gz
|
|
# Locally computed sha256 checksums
|
|
sha256 11db569430ca5ad793f1399297b8df5041a22137abaf90642ea71da21d59121c LICENSE.txt
|