chore(deps): update dependency requests to v2.32.4 [security]#16
Closed
renovate[bot] wants to merge 1 commit intodevelopfrom
Closed
chore(deps): update dependency requests to v2.32.4 [security]#16renovate[bot] wants to merge 1 commit intodevelopfrom
renovate[bot] wants to merge 1 commit intodevelopfrom
Conversation
bakerboy448
added a commit
that referenced
this pull request
Mar 1, 2026
- Flask 2.2.5 → 3.1.3 (session Vary header, low) - Werkzeug 3.0.2 → 3.1.6 (safe_join device names, debugger RCE, resource exhaustion) - Jinja2 3.1.4 → 3.1.6 (sandbox breakout via filenames/format/attr) - requests 2.32.0 → 2.32.4 (.netrc credential leak) - itsdangerous 2.1.2 → 2.2.0 (Flask 3.x requirement) - click 8.1.7 → 8.1.8 - MarkupSafe 2.1.5 → 3.0.2 - Add blinker 1.9.0 (Flask 3.x requirement) Resolves: #4, #7, #8, #10, #11, #12, #13, #14, #15, #16, #17
3 tasks
bakerboy448
added a commit
that referenced
this pull request
Mar 1, 2026
## Summary - Bumps all pinned dependencies to resolve all 11 open Dependabot alerts - Flask 2.2.5 → 3.1.3 (major bump — app uses only basic routing/jsonify, no breaking changes) - Werkzeug 3.0.2 → 3.1.6 (5 CVEs: safe_join, debugger RCE, resource exhaustion) - Jinja2 3.1.4 → 3.1.6 (3 CVEs: sandbox breakout via filenames/format/attr) - requests 2.32.0 → 2.32.4 (.netrc credential leak) - Adds blinker 1.9.0 (new Flask 3.x requirement) - Bumps itsdangerous, click, MarkupSafe to Flask 3.x compatible versions Resolves #4, #7, #8, #10, #11, #12, #13, #14, #15, #16, #17 ## Test plan - [ ] Docker image builds successfully - [ ] `/update-dns?guid=<test>` endpoint responds correctly - [ ] All 11 Dependabot alerts auto-close after merge <!-- This is an auto-generated comment: release notes by coderabbit.ai --> ## Summary by CodeRabbit ## Release Notes * **Chores** * Updated core framework and library dependencies to latest stable versions to improve application stability, security, and compatibility. <!-- end of auto-generated comment: release notes by coderabbit.ai -->
Collaborator
|
Superseded by #27 which bumps all dependencies together. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
==2.32.0→==2.32.4GitHub Vulnerability Alerts
CVE-2024-47081
Impact
Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs.
Workarounds
For older versions of Requests, use of the .netrc file can be disabled with
trust_env=Falseon your Requests Session (docs).References
https://github.com/psf/requests/pull/6965
https://seclists.org/fulldisclosure/2025/Jun/2
Release Notes
psf/requests (requests)
v2.32.4Compare Source
Security
environment will retrieve credentials for the wrong hostname/machine from a
netrc file.
Improvements
Deprecations
v2.32.3Compare Source
Bugfixes
HTTPAdapter. (#6716)
without the
sslmodule. (#6724)v2.32.2Compare Source
Deprecations
To provide a more stable migration for custom HTTPAdapters impacted
by the CVE changes in 2.32.0, we've renamed
_get_connectiontoa new public API,
get_connection_with_tls_context. Existing customHTTPAdapters will need to migrate their code to use this new API.
get_connectionis considered deprecated in all versions of Requests>=2.32.0.A minimal (2-line) example has been provided in the linked PR to ease
migration, but we strongly urge users to evaluate if their custom adapter
is subject to the same issue described in CVE-2024-35195. (#6710)
v2.32.1Compare Source
Bugfixes
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.