Skip to content

Update dependency requests to v2.32.2 [SECURITY]#79

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/pypi-requests-vulnerability
Open

Update dependency requests to v2.32.2 [SECURITY]#79
renovate[bot] wants to merge 1 commit intomainfrom
renovate/pypi-requests-vulnerability

Conversation

@renovate
Copy link

@renovate renovate bot commented Sep 27, 2024

This PR contains the following updates:

Package Change Age Confidence
requests (source, changelog) 2.31.02.32.2 age confidence
requests (source, changelog) ==2.31.0==2.32.2 age confidence

GitHub Vulnerability Alerts

CVE-2024-35195

When using a requests.Session, if the first request to a given origin is made with verify=False, TLS certificate verification may remain disabled for all subsequent requests to that origin, even if verify=True is explicitly specified later.

This occurs because the underlying connection is reused from the session's connection pool, causing the initial TLS verification setting to persist for the lifetime of the pooled connection. As a result, applications may unintentionally send requests without certificate verification, leading to potential man-in-the-middle attacks and compromised confidentiality or integrity.

This behavior affects versions of requests prior to 2.32.0.


Release Notes

psf/requests (requests)

v2.32.2

Compare Source

Deprecations

  • To provide a more stable migration for custom HTTPAdapters impacted
    by the CVE changes in 2.32.0, we've renamed _get_connection to
    a new public API, get_connection_with_tls_context. Existing custom
    HTTPAdapters will need to migrate their code to use this new API.
    get_connection is considered deprecated in all versions of Requests>=2.32.0.

    A minimal (2-line) example has been provided in the linked PR to ease
    migration, but we strongly urge users to evaluate if their custom adapter
    is subject to the same issue described in CVE-2024-35195. (#​6710)

v2.32.1

Compare Source

Bugfixes

  • Add missing test certs to the sdist distributed on PyPI.

v2.32.0

Compare Source

Security

  • Fixed an issue where setting verify=False on the first request from a
    Session will cause subsequent requests to the same origin to also ignore
    cert verification, regardless of the value of verify.
    (GHSA-9wx4-h78v-vm56)

Improvements

  • verify=True now reuses a global SSLContext which should improve
    request time variance between first and subsequent requests. It should
    also minimize certificate load time on Windows systems when using a Python
    version built with OpenSSL 3.x. (#​6667)
  • Requests now supports optional use of character detection
    (chardet or charset_normalizer) when repackaged or vendored.
    This enables pip and other projects to minimize their vendoring
    surface area. The Response.text() and apparent_encoding APIs
    will default to utf-8 if neither library is present. (#​6702)

Bugfixes

  • Fixed bug in length detection where emoji length was incorrectly
    calculated in the request content-length. (#​6589)
  • Fixed deserialization bug in JSONDecodeError. (#​6629)
  • Fixed bug where an extra leading / (path separator) could lead
    urllib3 to unnecessarily reparse the request URI. (#​6644)

Deprecations

  • Requests has officially added support for CPython 3.12 (#​6503)
  • Requests has officially added support for PyPy 3.9 and 3.10 (#​6641)
  • Requests has officially dropped support for CPython 3.7 (#​6642)
  • Requests has officially dropped support for PyPy 3.7 and 3.8 (#​6641)

Documentation

  • Various typo fixes and doc improvements.

Packaging

  • Requests has started adopting some modern packaging practices.
    The source files for the projects (formerly requests) is now located
    in src/requests in the Requests sdist. (#​6506)
  • Starting in Requests 2.33.0, Requests will migrate to a PEP 517 build system
    using hatchling. This should not impact the average user, but extremely old
    versions of packaging utilities may have issues with the new packaging format.

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about these updates again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@sourcery-ai
Copy link

sourcery-ai bot commented Sep 27, 2024

🧙 Sourcery has finished reviewing your pull request!


Tips and commands

Interacting with Sourcery

  • Trigger a new review: Comment @sourcery-ai review on the pull request.
  • Continue discussions: Reply directly to Sourcery's review comments.
  • Generate a GitHub issue from a review comment: Ask Sourcery to create an
    issue from a review comment by replying to it.

Customizing Your Experience

Access your dashboard to:

  • Enable or disable review features such as the Sourcery-generated pull request
    summary, the reviewer's guide, and others.
  • Change the review language.
  • Add, remove or edit custom review instructions.
  • Adjust other review settings.

Getting Help

Copy link

@sourcery-ai sourcery-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We have skipped reviewing this pull request. It seems to have been created by a bot (hey, renovate[bot]!). We assume it knows what it's doing!

@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch from fb040e3 to 0077602 Compare October 30, 2024 05:41
@coderabbitai
Copy link

coderabbitai bot commented Oct 30, 2024

Important

Review skipped

Bot user detected.

To trigger a single review, invoke the @coderabbitai review command.

You can disable this status message by setting the reviews.review_status to false in the CodeRabbit configuration file.


Comment @coderabbitai help to get the list of available commands and usage tips.

@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch from 0077602 to a349218 Compare November 4, 2024 08:49
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch from a349218 to ede5c9e Compare January 16, 2025 03:37
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch from ede5c9e to a03e52c Compare January 31, 2025 03:42
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch from a03e52c to 7b18d74 Compare March 5, 2025 04:05
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch 2 times, most recently from dbcdb06 to a468964 Compare March 18, 2025 00:11
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch from a468964 to b4fcdce Compare April 8, 2025 23:53
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch from b4fcdce to aa3b0f0 Compare May 10, 2025 07:54
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch from aa3b0f0 to 7cd9117 Compare September 25, 2025 03:14
@renovate renovate bot changed the title Update dependency requests to v2.32.2 [SECURITY] Update dependency requests to v2.32.4 [SECURITY] Sep 25, 2025
@renovate renovate bot force-pushed the renovate/pypi-requests-vulnerability branch from 7cd9117 to f8b5177 Compare October 16, 2025 03:25
@renovate renovate bot changed the title Update dependency requests to v2.32.4 [SECURITY] Update dependency requests to v2.32.2 [SECURITY] Oct 16, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants