Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2015.0238 requests security update 2 February 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: requests Publisher: Debian Operating System: Debian GNU/Linux 7 UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Access Privileged Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2014-1830 CVE-2014-1829 Original Bulletin: http://www.debian.org/security/2015/dsa-3146 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running requests check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-3146-1 security@debian.org http://www.debian.org/security/ Sebastien Delafond January 30, 2015 http://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : requests CVE ID : CVE-2014-1829 CVE-2014-1830 Debian Bug : 733108 Jakub Wilk discovered that in requests, an HTTP library for the Python language, authentication information was improperly handled when a redirect occured. This would allow remote servers to obtain two different types of sensitive information: proxy passwords from the Proxy-Authorization header (CVE-2014-1830), or netrc passwords from the Authorization header (CVE-2014-1829). For the stable distribution (wheezy), this problem has been fixed in version 0.12.1-1+deb7u1. For the upcoming stable distribution (jessie) and unstable distribution (sid), this problem has been fixed in version 2.3.0-1. We recommend that you upgrade your requests packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQEcBAEBCAAGBQJUy49eAAoJEBC+iYPz1Z1k9NkH/0gfqT+iVAg7eEUv45Cq+2eC GhqAK4kWssYQQ9TxjUm2jC+5ACMzqP5wNTCu9LZHeAYv08MXd+D+kcmCgyUKpd6T TE12DbO8fdW9Kos6al4vukxmDCOemXYmX2XDzzCw2hUk1g3Qummh7lB2M2vjs7o3 IcRo05HLh97qbulduPD0lmsU8na4NNPItTQMqtBn6uCp35AANTxNyDlzxxl3qKhq WoCzVFWU+S0Z44k2laqp8yxOlNnTGoMH3inQL74T5jIhWGNNKntFZJf4HD252OH3 snoscPYNVldRteJ2uyzxOY95x0ybn46fvTk76Mno9tVoxjfDq9UWTb/Xt3+lFDo= =0AoF - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVM7RlRLndAQH1ShLAQJN7w/+Or1QXfWucjJHUz/J7DWUQaFY/PYmhk/t Caw4aFHBY8i48YsZehUW3nQgz4fwlz1FQugC/1EbnR+iu8S2Uix4cLwWKZHGSf9r DeN3ZQTmi/RRaQ3y5HTG8cc3HjZIQGzdGfpdE7zlPFgyc66Lbv/JL03Jpv3bb0u4 NDzfGVboZPt1P61N06kNDLUZ7WUK+cei10+LQ+10dBiK3mmhYb0ZCqZ2tFbdZCmC MoOh4CTwbVXZMZ14SjDjYsbYBIvwHAJeP+EL+wd0as4UF0RzQYsw6n/1vLQ3KATr jrkkvDrN9cXAO0zaao3qC05q9uQWQnEObsmckFE8Yj5VJCGpV+vJPuu2lCA5Iy8W 5rAo0TGeJleeXrTMtkLnovxOAHiC5VIWA3ktPL76kZBT+lgnOJ1Fr3kAwWDTuTUk vj4WpmgWxuyf1U4sCII9LhHPDs2O7h/I9LRqCy0T8atuszNL5qnBSHLjJkXyL825 dxCcEgC+exSjqjz7exFHPmsFk/+9YZFjigZLWf9nt1H1C9GM0ffHZP8XJj2jG0dj icFEHYO01/RjSSlZrZAnD4BrYDO99nRT1K7T3kq6Zy/5/idn8YZpLp8UNafviMNW jxhKpRbjWBtN7zZ2BvOpkZKWZiBtvG/RH5Q2QMnzKf6dvRr+8/AzY4NFbgO1J0EI cj+lmUhbqKQ= =Pvf4 -----END PGP SIGNATURE-----