18F / pulse

How the federal .gov domain space is doing at best practices and policies.
Other
94 stars 56 forks source link

Bump waitress from 1.0.1 to 1.4.2 #816

Open dependabot[bot] opened 4 years ago

dependabot[bot] commented 4 years ago

Bumps waitress from 1.0.1 to 1.4.2.

Release notes *Sourced from [waitress's releases](https://github.com/Pylons/waitress/releases).* > ## v1.4.2 > No release notes provided. > > ## v1.4.1 > No release notes provided. > > ## v1.4.0 > No release notes provided. > > ## v1.3.1 > No release notes provided. > > ## v1.3.0 > No release notes provided. > > ## v1.3.0b0 > No release notes provided. > > ## v1.2.1 > No release notes provided. > > ## v1.2.0 > No release notes provided. > > ## v1.1.0 > https://pypi.org/project/waitress/1.1.0/ > > ## v1.0.2 > No release notes provided.
Changelog *Sourced from [waitress's changelog](https://github.com/Pylons/waitress/blob/master/CHANGES.txt).* > 1.4.2 (2020-01-02) > ------------------ > > Security Fixes > ~~~~~~~~~~~~~~ > > - This is a follow-up to the fix introduced in 1.4.1 to tighten up the way > Waitress strips whitespace from header values. This makes sure Waitress won't > accidentally treat non-printable characters as whitespace and lead to a > potental HTTP request smuggling/splitting security issue. > > Thanks to ZeddYu Lu for the extra test cases. > > Please see the security advisory for more information: > https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 > > CVE-ID: CVE-2019-16789 > > Bugfixes > ~~~~~~~~ > > - Updated the regex used to validate header-field content to match the errata > that was published for RFC7230. > > See: https://www.rfc-editor.org/errata_search.php?rfc=7230&eid=4189 > > > 1.4.1 (2019-12-24) > ------------------ > > Security Fixes > ~~~~~~~~~~~~~~ > > - Waitress did not properly validate that the HTTP headers it received were > properly formed, thereby potentially allowing a front-end server to treat a > request different from Waitress. This could lead to HTTP request > smuggling/splitting. > > Please see the security advisory for more information: > https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4 > > CVE-ID: CVE-2019-16789 > > 1.4.0 (2019-12-20) > ------------------ > > Bugfixes > ~~~~~~~~ > > - Waitress used to slam the door shut on HTTP pipelined requests without > ... (truncated)
Commits - [`8af9adb`](https://github.com/Pylons/waitress/commit/8af9adb8e9078bfdbc3adf9153b04e2d4471222d) Prep for 1.4.2 - [`634d991`](https://github.com/Pylons/waitress/commit/634d991ff4e0f7fd5f30c0cbedec29133071a455) Merge pull request [#277](https://github-redirect.dependabot.com/Pylons/waitress/issues/277) from Pylons/invalid-whitespace-cont - [`3a54e29`](https://github.com/Pylons/waitress/commit/3a54e2993db7182feaea4602aac7c1fa8f2ca08b) Add CHANGES and bump version to 1.4.2 - [`0bf98da`](https://github.com/Pylons/waitress/commit/0bf98dadd8cae23830cb365cc6cb9cedd7f98db0) Update RFC7230 regex with errata for header field-content - [`ddb65b4`](https://github.com/Pylons/waitress/commit/ddb65b489d01d696afa1695b75fdd5df3e4ffdf8) Remove accidental stripping of non-printable characters - [`cd83598`](https://github.com/Pylons/waitress/commit/cd8359864400592ba0db5d74e650a8fac4763d0d) Prep v1.4.1 - [`11d9e13`](https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de017) Merge pull request from GHSA-m5ff-3wj3-8ph4 - [`a046a76`](https://github.com/Pylons/waitress/commit/a046a7667c8a7afa0237c668e6ff33f7c10894f7) Add links to advisories for previous security issues - [`3c58e39`](https://github.com/Pylons/waitress/commit/3c58e397cc17e51e1127e971621fb617b04bd33d) Bump version number - [`de3324d`](https://github.com/Pylons/waitress/commit/de3324dd2126ce7ae1e55411f2684c333d96d62b) Add documentation for security issue - Additional commits viewable in [compare view](https://github.com/Pylons/waitress/compare/v1.0.1...v1.4.2)


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot ignore this [patch|minor|major] version` will close this PR and stop Dependabot creating any more for this minor/major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) - `@dependabot use these labels` will set the current labels as the default for future PRs for this repo and language - `@dependabot use these reviewers` will set the current reviewers as the default for future PRs for this repo and language - `@dependabot use these assignees` will set the current assignees as the default for future PRs for this repo and language - `@dependabot use this milestone` will set the current milestone as the default for future PRs for this repo and language You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/18F/pulse/network/alerts).
its-a-lisa-at-work commented 4 years ago

@18F/pulse-cio-gov-collaborators please address this pull request