python-requests
No description set
- Developed at devel:languages:python
- Sources inherited from project openSUSE:Factory
-
15
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory:PowerPC/python-requests && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_multibuild | 0000000053 53 Bytes | |
python-requests.changes | 0000066868 65.3 KB | |
python-requests.spec | 0000004032 3.94 KB | |
requests-2.31.0.tar.gz | 0000110794 108 KB |
Revision 79 (latest revision is 81)
Dominique Leuenberger (dimstar_suse)
accepted
request 1092607
from
Daniel Garcia (dgarcia)
(revision 79)
- Delete requests-no-hardcoded-version.patch - Security Update to 2.31.0 (bsc#1211674): Versions of Requests between v2.3.0 and v2.30.0 are vulnerable to potential forwarding of Proxy-Authorization headers to destination servers when following HTTPS redirects. When proxies are defined with user info (https://user:pass@proxy:8080), Requests will construct a Proxy-Authorization header that is attached to the request to authenticate with the proxy. In cases where Requests receives a redirect response, it previously reattached the Proxy-Authorization header incorrectly, resulting in the value being sent through the tunneled connection to the destination server. Users who rely on defining their proxy credentials in the URL are strongly encouraged to upgrade to Requests 2.31.0+ to prevent unintentional leakage and rotate their proxy credentials once the change has been fully deployed. Users who do not use a proxy or do not supply their proxy credentials through the user information portion of their proxy URL are not subject to this vulnerability. Full details can be read in our Github Security Advisory and CVE-2023-32681.
Comments 0