SUSE-SU-2016:0114-1: moderate: Security update for python-requests

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Wed Jan 13 16:11:06 MST 2016


   SUSE Security Update: Security update for python-requests
______________________________________________________________________________

Announcement ID:    SUSE-SU-2016:0114-1
Rating:             moderate
References:         #922448 #929736 #961596 
Cross-References:   CVE-2015-2296
Affected Products:
                    SUSE OpenStack Cloud Compute 5
                    SUSE Linux Enterprise Server 12-SP1
                    SUSE Linux Enterprise Server 12
                    SUSE Linux Enterprise Module for Public Cloud 12
                    SUSE Linux Enterprise High Availability 12
                    SUSE Linux Enterprise Desktop 12-SP1
                    SUSE Enterprise Storage 2
                    SUSE Enterprise Storage 1.0
______________________________________________________________________________

   An update that solves one vulnerability and has two fixes
   is now available.

Description:


   The python-requests module has been updated to version 2.8.1, which brings
   several fixes and enhancements:

   - Fix handling of cookies on redirect. Previously a cookie without a host
     value set would use the hostname for the redirected URL exposing
     requests users to session fixation attacks and potentially cookie
     stealing. (bsc#922448, CVE-2015-2296)

   - Add support for per-host proxies. This allows the proxies dictionary to
     have entries
     of the form {'<scheme>://<hostname>': '<proxy>'}. Host-specific proxies
      will be used in preference to the previously-supported scheme-specific
      ones, but the previous syntax will continue to work.
   - Update certificate bundle to match "certifi" 2015.9.6.2's weak
     certificate bundle.
   - Response.raise_for_status now prints the URL that failed as part of the
     exception message.
   - requests.utils.get_netrc_auth now takes an raise_errors kwarg,
     defaulting to False. When True, errors parsing .netrc files cause
     exceptions to be thrown.
   - Change to bundled projects import logic to make it easier to unbundle
     requests downstream.
   - Change the default User-Agent string to avoid leaking data on Linux: now
     contains only the requests version.
   - The json parameter to post() and friends will now only be used if
     neither data nor files are present, consistent with the documentation.
   - Empty fields in the NO_PROXY environment variable are now ignored.
   - Fix problem where httplib.BadStatusLine would get raised if combining
     stream=True with contextlib.closing.
   - Prevent bugs where we would attempt to return the same connection back
     to the connection pool twice when sending a Chunked body.
   - Digest Auth support is now thread safe.
   - Resolved several bugs involving chunked transfer encoding and response
     framing.
   - Copy a PreparedRequest's CookieJar more reliably.
   - Support bytearrays when passed as parameters in the "files" argument.
   - Avoid data duplication when creating a request with "str", "bytes", or
     "bytearray" input to the "files" argument.
   - "Connection: keep-alive" header is now sent automatically.
   - Support for connect timeouts. Timeout now accepts a tuple (connect,
     read) which is used to set individual connect and read timeouts.

   For a comprehensive list of changes please refer to the package's change
   log or the Release Notes at
   http://docs.python-requests.org/en/latest/community/updates/#id3


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE OpenStack Cloud Compute 5:

      zypper in -t patch SUSE-SLE12-CLOUD-5-2016-80=1

   - SUSE Linux Enterprise Server 12-SP1:

      zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-80=1

   - SUSE Linux Enterprise Server 12:

      zypper in -t patch SUSE-SLE-SERVER-12-2016-80=1

   - SUSE Linux Enterprise Module for Public Cloud 12:

      zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2016-80=1

   - SUSE Linux Enterprise High Availability 12:

      zypper in -t patch SUSE-SLE-HA-12-2016-80=1

   - SUSE Linux Enterprise Desktop 12-SP1:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-80=1

   - SUSE Enterprise Storage 2:

      zypper in -t patch SUSE-Storage-2-2016-80=1

   - SUSE Enterprise Storage 1.0:

      zypper in -t patch SUSE-Storage-1.0-2016-80=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE OpenStack Cloud Compute 5 (noarch):

      python-requests-2.8.1-6.9.1

   - SUSE Linux Enterprise Server 12-SP1 (noarch):

      python-requests-2.8.1-6.9.1

   - SUSE Linux Enterprise Server 12 (noarch):

      python-requests-2.8.1-6.9.1

   - SUSE Linux Enterprise Module for Public Cloud 12 (noarch):

      python-requests-2.8.1-6.9.1

   - SUSE Linux Enterprise High Availability 12 (noarch):

      python-requests-2.8.1-6.9.1

   - SUSE Linux Enterprise Desktop 12-SP1 (noarch):

      python-requests-2.8.1-6.9.1

   - SUSE Enterprise Storage 2 (noarch):

      python-requests-2.8.1-6.9.1

   - SUSE Enterprise Storage 1.0 (noarch):

      python-requests-2.8.1-6.9.1


References:

   https://www.suse.com/security/cve/CVE-2015-2296.html
   https://bugzilla.suse.com/922448
   https://bugzilla.suse.com/929736
   https://bugzilla.suse.com/961596



More information about the sle-security-updates mailing list