Go to file
Daniel Garcia f1ac59bf1f - Security Update to 2.31.0 (bsc#1211674):
Versions of Requests between v2.3.0 and v2.30.0 are vulnerable to potential
  forwarding of Proxy-Authorization headers to destination servers when
  following HTTPS redirects.
  When proxies are defined with user info (https://user:pass@proxy:8080), Requests
  will construct a Proxy-Authorization header that is attached to the request to
  authenticate with the proxy.
  In cases where Requests receives a redirect response, it previously reattached
  the Proxy-Authorization header incorrectly, resulting in the value being
  sent through the tunneled connection to the destination server. Users who rely on
  defining their proxy credentials in the URL are strongly encouraged to upgrade
  to Requests 2.31.0+ to prevent unintentional leakage and rotate their proxy
  credentials once the change has been fully deployed.
  Users who do not use a proxy or do not supply their proxy credentials through
  the user information portion of their proxy URL are not subject to this
  vulnerability.
  Full details can be read in our Github Security Advisory
  and CVE-2023-32681.

OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-requests?expand=0&rev=177
2023-06-12 12:04:25 +00:00
_multibuild Accepting request 623059 from home:mimi_vx:branches:devel:languages:python 2018-07-16 08:02:35 +00:00
.gitattributes - Initial release 2011-05-20 19:15:11 +00:00
.gitignore - Initial release 2011-05-20 19:15:11 +00:00
python-requests.changes - Security Update to 2.31.0 (bsc#1211674): 2023-06-12 12:04:25 +00:00
python-requests.spec - Security Update to 2.31.0 (bsc#1211674): 2023-06-12 12:04:25 +00:00
requests-2.31.0.tar.gz - Security Update to 2.31.0 (bsc#1211674): 2023-06-12 12:04:25 +00:00