-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.0238
                         requests security update
                              2 February 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           requests
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Access Privileged Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-1830 CVE-2014-1829 

Original Bulletin: 
   http://www.debian.org/security/2015/dsa-3146

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running requests check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3146-1                   security@debian.org
http://www.debian.org/security/                        Sebastien Delafond
January 30, 2015                       http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : requests
CVE ID         : CVE-2014-1829 CVE-2014-1830
Debian Bug     : 733108

Jakub Wilk discovered that in requests, an HTTP library for the Python
language, authentication information was improperly handled when a
redirect occured. This would allow remote servers to obtain two
different types of sensitive information: proxy passwords from the
Proxy-Authorization header (CVE-2014-1830), or netrc passwords from
the Authorization header (CVE-2014-1829).

For the stable distribution (wheezy), this problem has been fixed in
version 0.12.1-1+deb7u1.

For the upcoming stable distribution (jessie) and unstable
distribution (sid), this problem has been fixed in version 2.3.0-1.

We recommend that you upgrade your requests packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJUy49eAAoJEBC+iYPz1Z1k9NkH/0gfqT+iVAg7eEUv45Cq+2eC
GhqAK4kWssYQQ9TxjUm2jC+5ACMzqP5wNTCu9LZHeAYv08MXd+D+kcmCgyUKpd6T
TE12DbO8fdW9Kos6al4vukxmDCOemXYmX2XDzzCw2hUk1g3Qummh7lB2M2vjs7o3
IcRo05HLh97qbulduPD0lmsU8na4NNPItTQMqtBn6uCp35AANTxNyDlzxxl3qKhq
WoCzVFWU+S0Z44k2laqp8yxOlNnTGoMH3inQL74T5jIhWGNNKntFZJf4HD252OH3
snoscPYNVldRteJ2uyzxOY95x0ybn46fvTk76Mno9tVoxjfDq9UWTb/Xt3+lFDo=
=0AoF
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVM7RlRLndAQH1ShLAQJN7w/+Or1QXfWucjJHUz/J7DWUQaFY/PYmhk/t
Caw4aFHBY8i48YsZehUW3nQgz4fwlz1FQugC/1EbnR+iu8S2Uix4cLwWKZHGSf9r
DeN3ZQTmi/RRaQ3y5HTG8cc3HjZIQGzdGfpdE7zlPFgyc66Lbv/JL03Jpv3bb0u4
NDzfGVboZPt1P61N06kNDLUZ7WUK+cei10+LQ+10dBiK3mmhYb0ZCqZ2tFbdZCmC
MoOh4CTwbVXZMZ14SjDjYsbYBIvwHAJeP+EL+wd0as4UF0RzQYsw6n/1vLQ3KATr
jrkkvDrN9cXAO0zaao3qC05q9uQWQnEObsmckFE8Yj5VJCGpV+vJPuu2lCA5Iy8W
5rAo0TGeJleeXrTMtkLnovxOAHiC5VIWA3ktPL76kZBT+lgnOJ1Fr3kAwWDTuTUk
vj4WpmgWxuyf1U4sCII9LhHPDs2O7h/I9LRqCy0T8atuszNL5qnBSHLjJkXyL825
dxCcEgC+exSjqjz7exFHPmsFk/+9YZFjigZLWf9nt1H1C9GM0ffHZP8XJj2jG0dj
icFEHYO01/RjSSlZrZAnD4BrYDO99nRT1K7T3kq6Zy/5/idn8YZpLp8UNafviMNW
jxhKpRbjWBtN7zZ2BvOpkZKWZiBtvG/RH5Q2QMnzKf6dvRr+8/AzY4NFbgO1J0EI
cj+lmUhbqKQ=
=Pvf4
-----END PGP SIGNATURE-----