Skip to content

Commit b28c9e8

Browse files
Prep for 2.1.1
1 parent bd22869 commit b28c9e8

File tree

2 files changed

+27
-1
lines changed

2 files changed

+27
-1
lines changed

CHANGES.txt

+26
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,29 @@
1+
2.1.1
2+
-----
3+
4+
Security Bugfix
5+
~~~~~~~~~~~~~~~
6+
7+
- Waitress now validates that chunked encoding extensions are valid, and don't
8+
contain invalid characters that are not allowed. They are still skipped/not
9+
processed, but if they contain invalid data we no longer continue in and
10+
return a 400 Bad Request. This stops potential HTTP desync/HTTP request
11+
smuggling. Thanks to Zhang Zeyu for reporting this issue. See
12+
https://github.com/Pylons/waitress/security/advisories/GHSA-4f7p-27jc-3c36
13+
14+
- Waitress now validates that the chunk length is only valid hex digits when
15+
parsing chunked encoding, and values such as ``0x01`` and ``+01`` are no
16+
longer supported. This stops potential HTTP desync/HTTP request smuggling.
17+
Thanks to Zhang Zeyu for reporting this issue. See
18+
https://github.com/Pylons/waitress/security/advisories/GHSA-4f7p-27jc-3c36
19+
20+
- Waitress now validates that the Content-Length sent by a remote contains only
21+
digits in accordance with RFC7230 and will return a 400 Bad Request when the
22+
Content-Length header contains invalid data, such as ``+10`` which would
23+
previously get parsed as ``10`` and accepted. This stops potential HTTP
24+
desync/HTTP request smuggling Thanks to Zhang Zeyu for reporting this issue. See
25+
https://github.com/Pylons/waitress/security/advisories/GHSA-4f7p-27jc-3c36
26+
127
2.1.0
228
-----
329

setup.cfg

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[metadata]
22
name = waitress
3-
version = 2.1.0
3+
version = 2.1.1
44
description = Waitress WSGI server
55
long_description = file: README.rst, CHANGES.txt
66
long_description_content_type = text/x-rst

0 commit comments

Comments
 (0)