Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Bump requests from 2.30.0 to 2.31.0 in /pgml-sdks/python/pgml#647

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Conversation

@dependabot
Copy link
Contributor

@dependabotdependabotbot commented on behalf ofgithubMay 23, 2023

Bumpsrequests from 2.30.0 to 2.31.0.

Release notes

Sourced fromrequests's releases.

v2.31.0

2.31.0 (2023-05-22)

Security

  • Versions of Requests between v2.3.0 and v2.30.0 are vulnerable to potentialforwarding ofProxy-Authorization headers to destination servers whenfollowing HTTPS redirects.

    When proxies are defined with user info (https://user:pass@proxy:8080), Requestswill construct aProxy-Authorization header that is attached to the request toauthenticate with the proxy.

    In cases where Requests receives a redirect response, it previously reattachedtheProxy-Authorization header incorrectly, resulting in the value beingsent through the tunneled connection to the destination server. Users who rely ondefining their proxy credentials in the URL arestrongly encouraged to upgradeto Requests 2.31.0+ to prevent unintentional leakage and rotate their proxycredentials once the change has been fully deployed.

    Users who do not use a proxy or do not supply their proxy credentials throughthe user information portion of their proxy URL are not subject to thisvulnerability.

    Full details can be read in ourGithub Security AdvisoryandCVE-2023-32681.

Changelog

Sourced fromrequests's changelog.

2.31.0 (2023-05-22)

Security

  • Versions of Requests between v2.3.0 and v2.30.0 are vulnerable to potentialforwarding ofProxy-Authorization headers to destination servers whenfollowing HTTPS redirects.

    When proxies are defined with user info (https://user:pass@proxy:8080), Requestswill construct aProxy-Authorization header that is attached to the request toauthenticate with the proxy.

    In cases where Requests receives a redirect response, it previously reattachedtheProxy-Authorization header incorrectly, resulting in the value beingsent through the tunneled connection to the destination server. Users who rely ondefining their proxy credentials in the URL arestrongly encouraged to upgradeto Requests 2.31.0+ to prevent unintentional leakage and rotate their proxycredentials once the change has been fully deployed.

    Users who do not use a proxy or do not supply their proxy credentials throughthe user information portion of their proxy URL are not subject to thisvulnerability.

    Full details can be read in ourGithub Security AdvisoryandCVE-2023-32681.

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting@dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from theSecurity Alerts page.

Bumps [requests](https://github.com/psf/requests) from 2.30.0 to 2.31.0.- [Release notes](https://github.com/psf/requests/releases)- [Changelog](https://github.com/psf/requests/blob/main/HISTORY.md)- [Commits](psf/requests@v2.30.0...v2.31.0)---updated-dependencies:- dependency-name: requests  dependency-type: indirect...Signed-off-by: dependabot[bot] <support@github.com>
@dependabotdependabotbot added dependenciesPull requests that update a dependency file pythonPull requests that update Python code labelsMay 23, 2023
@montanalowmontanalow merged commite7d655f intomasterMay 23, 2023
@montanalowmontanalow deleted the dependabot/pip/pgml-sdks/python/pgml/requests-2.31.0 branchMay 23, 2023 23:16
SilasMarvin pushed a commit that referenced this pull requestOct 5, 2023
Signed-off-by: dependabot[bot] <support@github.com>Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment

Reviewers

No reviews

Assignees

No one assigned

Labels

dependenciesPull requests that update a dependency filepythonPull requests that update Python code

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

2 participants

@montanalow

[8]ページ先頭

©2009-2025 Movatter.jp