Summary: | <dev-python/requests-2.3.0: Proxy-Authorization header leak (CVE-2014-{1829,1830}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | python |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1144907 | ||
Whiteboard: | B3 [noglsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 513278 | ||
Bug Blocks: |
Description
Agostino Sarubbo
2014-09-22 08:10:50 UTC
So this is actually an oldie: http://www.openwall.com/lists/oss-security/2014/09/19/1 Fixed in 2.3.0 already. So 2.3.0 was already being stabilized in bug 513278. CC'ing the rest of the arches here to bump priority a little bit. When doing cleanup of old versions, beware of these reverse deps: dev-python/docker-py-0.5.0-r1 ~dev-python/requests-2.2.1 media-video/subliminal-0.6.3 ~dev-python/requests-0.14.2 ppc stable Please continue with stabilization. ppc64 stable x86 stable. Maintainer(s), please cleanup. Security, please vote. GLSA vote: no. Arches and Maintainer(s), Thank you for your work. GLSA Vote: No CVE-2014-1830 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1830): Requests (aka python-requests) before 2.3.0 allows remote servers to obtain sensitive information by reading the Proxy-Authorization header in a redirected request. CVE-2014-1829 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1829): Requests (aka python-requests) before 2.3.0 allows remote servers to obtain a netrc password by reading the Authorization header in a redirected request. |