Skip to content

Conversation

@dependabot
Copy link

@dependabot dependabot bot commented on behalf of github Jul 31, 2025

Bumps requests from 2.31.0 to 2.32.4.

Release notes

Sourced from requests's releases.

v2.32.4

2.32.4 (2025-06-10)

Security

  • CVE-2024-47081 Fixed an issue where a maliciously crafted URL and trusted environment will retrieve credentials for the wrong hostname/machine from a netrc file. (#6965)

Improvements

  • Numerous documentation improvements

Deprecations

  • Added support for pypy 3.11 for Linux and macOS. (#6926)
  • Dropped support for pypy 3.9 following its end of support. (#6926)

v2.32.3

2.32.3 (2024-05-29)

Bugfixes

  • Fixed bug breaking the ability to specify custom SSLContexts in sub-classes of HTTPAdapter. (#6716)
  • Fixed issue where Requests started failing to run on Python versions compiled without the ssl module. (#6724)

v2.32.2

2.32.2 (2024-05-21)

Deprecations

  • To provide a more stable migration for custom HTTPAdapters impacted by the CVE changes in 2.32.0, we've renamed _get_connection to a new public API, get_connection_with_tls_context. Existing custom HTTPAdapters will need to migrate their code to use this new API. get_connection is considered deprecated in all versions of Requests>=2.32.0.

    A minimal (2-line) example has been provided in the linked PR to ease migration, but we strongly urge users to evaluate if their custom adapter is subject to the same issue described in CVE-2024-35195. (#6710)

v2.32.1

2.32.1 (2024-05-20)

Bugfixes

  • Add missing test certs to the sdist distributed on PyPI.

v2.32.0

2.32.0 (2024-05-20)

... (truncated)

Changelog

Sourced from requests's changelog.

2.32.4 (2025-06-10)

Security

  • CVE-2024-47081 Fixed an issue where a maliciously crafted URL and trusted environment will retrieve credentials for the wrong hostname/machine from a netrc file.

Improvements

  • Numerous documentation improvements

Deprecations

  • Added support for pypy 3.11 for Linux and macOS.
  • Dropped support for pypy 3.9 following its end of support.

2.32.3 (2024-05-29)

Bugfixes

  • Fixed bug breaking the ability to specify custom SSLContexts in sub-classes of HTTPAdapter. (#6716)
  • Fixed issue where Requests started failing to run on Python versions compiled without the ssl module. (#6724)

2.32.2 (2024-05-21)

Deprecations

  • To provide a more stable migration for custom HTTPAdapters impacted by the CVE changes in 2.32.0, we've renamed _get_connection to a new public API, get_connection_with_tls_context. Existing custom HTTPAdapters will need to migrate their code to use this new API. get_connection is considered deprecated in all versions of Requests>=2.32.0.

    A minimal (2-line) example has been provided in the linked PR to ease migration, but we strongly urge users to evaluate if their custom adapter is subject to the same issue described in CVE-2024-35195. (#6710)

2.32.1 (2024-05-20)

Bugfixes

  • Add missing test certs to the sdist distributed on PyPI.

2.32.0 (2024-05-20)

Security

... (truncated)

Commits
  • 021dc72 Polish up release tooling for last manual release
  • 821770e Bump version and add release notes for v2.32.4
  • 59f8aa2 Add netrc file search information to authentication documentation (#6876)
  • 5b4b64c Add more tests to prevent regression of CVE 2024 47081
  • 7bc4587 Add new test to check netrc auth leak (#6962)
  • 96ba401 Only use hostname to do netrc lookup instead of netloc
  • 7341690 Merge pull request #6951 from tswast/patch-1
  • 6716d7c remove links
  • a7e1c74 Update docs/conf.py
  • c799b81 docs: fix dead links to kenreitz.org
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [requests](https://github.com/psf/requests) from 2.31.0 to 2.32.4.
- [Release notes](https://github.com/psf/requests/releases)
- [Changelog](https://github.com/psf/requests/blob/main/HISTORY.md)
- [Commits](psf/requests@v2.31.0...v2.32.4)

---
updated-dependencies:
- dependency-name: requests
  dependency-version: 2.32.4
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file python Pull requests that update python code labels Jul 31, 2025
@jpeaks-eroad
Copy link

Logo
Checkmarx One – Scan Summary & Details80adb52e-29e3-46dd-8794-d28599bfd9f9

New Issues (60)

Checkmarx found the following issues in this Pull Request

Severity Issue Source File / Package Checkmarx Insight
HIGH Missing User Instruction /Dockerfile: 1
detailsA user should be specified in the dockerfile, otherwise the image will run as root
ID: Ahh1eu%2FgD0iAJQvAcrOApZZvp7M%3D
HIGH Privilege Escalation Allowed /deployment.yaml: 37
detailsContainers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
ID: Aoipca%2BFcBVYERAWhMPzvFCOYvw%3D
HIGH Privilege Escalation Allowed /deployment.yaml: 23
detailsContainers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
ID: 6QjrZzXVr4ERdC%2BDqbFLVOAu1PY%3D
HIGH Privilege Escalation Allowed /deployment.yaml: 38
detailsContainers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
ID: IZW0m7qeHC8mG3RciXwIJx5WRpo%3D
HIGH RBAC Wildcard In Rule /rbac.yaml: 20
detailsRoles and ClusterRoles with wildcard RBAC permissions provide excessive rights to the Kubernetes API and should be avoided. The principle of least...
ID: QrzOI%2B250Dr1rXA66mpgukEM%2Fc0%3D
HIGH RBAC Wildcard In Rule /rbac.yaml: 19
detailsRoles and ClusterRoles with wildcard RBAC permissions provide excessive rights to the Kubernetes API and should be avoided. The principle of least...
ID: JVy8TnYSFetv35QJBZkD7m3JUjM%3D
HIGH RBAC Wildcard In Rule /rbac.yaml: 17
detailsRoles and ClusterRoles with wildcard RBAC permissions provide excessive rights to the Kubernetes API and should be avoided. The principle of least...
ID: 0ypQoebrEix5dEcvFxKt%2FrvlwFk%3D
HIGH RBAC Wildcard In Rule /cluster-role.yaml: 10
detailsRoles and ClusterRoles with wildcard RBAC permissions provide excessive rights to the Kubernetes API and should be avoided. The principle of least...
ID: YjpWIiOIT%2B10lLWh1VMdpRT5bYA%3D
HIGH RBAC Wildcard In Rule /rbac.yaml: 18
detailsRoles and ClusterRoles with wildcard RBAC permissions provide excessive rights to the Kubernetes API and should be avoided. The principle of least...
ID: il4tn%2FDF%2BT3YRr1fCaQsoUDnW78%3D
HIGH RBAC Wildcard In Rule /cluster-role.yaml: 10
detailsRoles and ClusterRoles with wildcard RBAC permissions provide excessive rights to the Kubernetes API and should be avoided. The principle of least...
ID: dG4SK1vzcuQUFkmS9mhWQHcdIwc%3D
MEDIUM Container Running As Root /deployment.yaml: 23
detailsContainers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibiliti...
ID: gQSIB%2F4UG6DiDGwH%2BpJ21ZLd5JU%3D
MEDIUM Container Running With Low UID /deployment.yaml: 41
detailsCheck if containers are running with low UID, which might cause conflicts with the host's user table.
ID: jplgUvGBTxSfCRx0m6BUuGGPsbw%3D
MEDIUM Container Running With Low UID /deployment.yaml: 23
detailsCheck if containers are running with low UID, which might cause conflicts with the host's user table.
ID: Tmbp%2BwkXWQgtB1iT2M5trvyWiZQ%3D
MEDIUM Container Running With Low UID /deployment.yaml: 40
detailsCheck if containers are running with low UID, which might cause conflicts with the host's user table.
ID: N4Oc%2BAkXMZ49%2FBbwtthVE3BRDFM%3D
MEDIUM Memory Limits Not Defined /deployment.yaml: 23
detailsMemory limits should be defined for each container. This prevents potential resource exhaustion by ensuring that containers consume not more than ...
ID: rt0q1NkA9g9t2dgAa9Jh0bqbXOo%3D
MEDIUM Memory Requests Not Defined /deployment.yaml: 23
detailsMemory requests should be defined for each container. This allows the kubelet to reserve the requested amount of system resources and prevents ove...
ID: XEXadd5i7KmdE77EkVPHRw1pUBY%3D
MEDIUM NET_RAW Capabilities Not Being Dropped /deployment.yaml: 25
detailsContainers should drop 'ALL' or at least 'NET_RAW' capabilities
ID: DAGT2m1%2FoL%2FT4TIpCL89w9jjOv8%3D
MEDIUM NET_RAW Capabilities Not Being Dropped /deployment.yaml: 21
detailsContainers should drop 'ALL' or at least 'NET_RAW' capabilities
ID: QBSvWK0NcVwXqxi4kv9Rqoz9uh8%3D
MEDIUM NET_RAW Capabilities Not Being Dropped /deployment.yaml: 23
detailsContainers should drop 'ALL' or at least 'NET_RAW' capabilities
ID: Gs1lQ7oxeW7QcG66xM%2F%2BwBkA%2FWc%3D
MEDIUM Readiness Probe Is Not Configured /deployment.yaml: 21
detailsCheck if Readiness Probe is not configured.
ID: J5rcW%2BfdaZ3yzPVSzTilxeHtVUA%3D
MEDIUM Readiness Probe Is Not Configured /deployment.yaml: 25
detailsCheck if Readiness Probe is not configured.
ID: Xyd%2BRwyVBLw%2BxCU%2BWXTRSGV3nUU%3D
MEDIUM Readiness Probe Is Not Configured /deployment.yaml: 23
detailsCheck if Readiness Probe is not configured.
ID: JhFikoPXKZ7KFhQacxTEweS7Nqk%3D
MEDIUM Seccomp Profile Is Not Configured /deployment.yaml: 23
detailsContainers should be configured with a secure Seccomp profile to restrict potentially dangerous syscalls
ID: Ii%2F%2By3Tz8dBLaJ0YaB8xehvkec0%3D
MEDIUM Seccomp Profile Is Not Configured /deployment.yaml: 38
detailsContainers should be configured with a secure Seccomp profile to restrict potentially dangerous syscalls
ID: O31HVo8Qk4PWAFzXON3WfFyb8Ho%3D
MEDIUM Seccomp Profile Is Not Configured /deployment.yaml: 37
detailsContainers should be configured with a secure Seccomp profile to restrict potentially dangerous syscalls
ID: AzXrkCKjxrpw2cXdc12fcPzdtLA%3D
MEDIUM Service Account Token Automount Not Disabled /deployment.yaml: 18
detailsService Account Tokens are automatically mounted even if not necessary
ID: Fz04TJBqabvScaKViwb8hKrSu4Y%3D
MEDIUM Service Account Token Automount Not Disabled /deployment.yaml: 20
detailsService Account Tokens are automatically mounted even if not necessary
ID: o5LG7%2BrQCKWy55dORpMHc0NCK%2BQ%3D
MEDIUM Unpinned Package Version in Pip Install /Dockerfile: 5
detailsPackage version pinning reduces the range of versions that can be installed, reducing the chances of failure due to unanticipated changes
ID: %2Fe%2FEgsWJEM1INK5gXKd5%2BQE4qSY%3D
MEDIUM Using Unrecommended Namespace /rbac.yaml: 4
detailsNamespaces like 'default', 'kube-system' or 'kube-public' should not be used
ID: q0VHysucw38NfqlOD%2By18kEFlk4%3D
MEDIUM Using Unrecommended Namespace /configmap.yaml: 4
detailsNamespaces like 'default', 'kube-system' or 'kube-public' should not be used
ID: PfTLlrVgXtn8M7PNTEknfkEQ2mw%3D
MEDIUM Using Unrecommended Namespace /deployment.yaml: 7
detailsNamespaces like 'default', 'kube-system' or 'kube-public' should not be used
ID: col%2B%2B%2FMm%2FmZMgALzSZX2WHYisXQ%3D
MEDIUM Using Unrecommended Namespace /service-account.yaml: 4
detailsNamespaces like 'default', 'kube-system' or 'kube-public' should not be used
ID: TLPbRwHUeH0WATLtztc1rr%2BAhzs%3D
MEDIUM Using Unrecommended Namespace /rbac.yaml: 5
detailsNamespaces like 'default', 'kube-system' or 'kube-public' should not be used
ID: 0pMWQyohFRneHg3Uqp0O%2FyqKwCo%3D
MEDIUM Using Unrecommended Namespace /deployment.yaml: 6
detailsNamespaces like 'default', 'kube-system' or 'kube-public' should not be used
ID: 5AuT1DYJI3S2UcYjhWwFRSmeOvM%3D
LOW CPU Limits Not Set /deployment.yaml: 32
detailsCPU limits should be set because if the system has CPU time free, a container is guaranteed to be allocated as much CPU as it requests
ID: 37BxUYjgZLorZwDDONYEHrK%2BMJI%3D
LOW CPU Limits Not Set /deployment.yaml: 23
detailsCPU limits should be set because if the system has CPU time free, a container is guaranteed to be allocated as much CPU as it requests
ID: UTBd%2F0IEKSxp%2BHfd93PIv4Muw6E%3D
LOW CPU Limits Not Set /deployment.yaml: 33
detailsCPU limits should be set because if the system has CPU time free, a container is guaranteed to be allocated as much CPU as it requests
ID: wJ6etK4s%2Fd%2BkF3p29LxDLhWeCB0%3D
LOW CPU Requests Not Set /deployment.yaml: 23
detailsCPU requests should be set to ensure the sum of the resource requests of the scheduled Containers is less than the capacity of the node
ID: MXICS5P0x2hd%2BXMkRU6LsCo9WUc%3D
LOW Healthcheck Instruction Missing /Dockerfile: 1
detailsEnsure that HEALTHCHECK is being used. The HEALTHCHECK instruction tells Docker how to test a container to check that it is still working
ID: fRMy4xkJQynXXJI%2FOQXb9H%2FXXlc%3D
LOW Image Pull Policy Of The Container Is Not Set To Always /deployment.yaml: 21
detailsImage Pull Policy of the container must be defined and set to Always
ID: loVjgsejluDnBefb7UIIWhMEAhI%3D
LOW Image Pull Policy Of The Container Is Not Set To Always /deployment.yaml: 25
detailsImage Pull Policy of the container must be defined and set to Always
ID: Gwh7AtvaxntjD59YnG95MUoCtUE%3D
LOW Image Without Digest /deployment.yaml: 26
detailsImages should be specified together with their digests to ensure integrity
ID: X3ntBgLvfIWbR3%2FGuY32K3g3Yyc%3D
LOW Image Without Digest /deployment.yaml: 23
detailsImages should be specified together with their digests to ensure integrity
ID: BvVJ5Ir5kRAMxDPOr2MQcZnQ2YE%3D
LOW Image Without Digest /deployment.yaml: 24
detailsImages should be specified together with their digests to ensure integrity
ID: 779byaflGuIp3pjDpZWxuPHJXdE%3D
LOW Invalid Image Tag /deployment.yaml: 24
detailsImage tag must be defined and not be empty or equal to latest.
ID: uI9jzSCBC0y68FGfSZ%2FlkZLqN6I%3D
LOW Missing AppArmor Profile /deployment.yaml: 16
detailsContainers should be configured with an AppArmor profile to enforce fine-grained access control over low-level system resources
ID: %2FlaXV8V0a%2FayCeq0wMMqu5mgONs%3D
LOW Missing AppArmor Profile /deployment.yaml: 14
detailsContainers should be configured with an AppArmor profile to enforce fine-grained access control over low-level system resources
ID: YVd%2BFXqBayWwCrBeTKhCLAdbpdE%3D
LOW Missing AppArmor Profile /deployment.yaml: 16
detailsContainers should be configured with an AppArmor profile to enforce fine-grained access control over low-level system resources
ID: IwlQZUObyg3PQPfedkLh9OQyjIQ%3D
LOW Multiple RUN, ADD, COPY, Instructions Listed /Dockerfile: 7
detailsMultiple commands (RUN, COPY, ADD) should be grouped in order to reduce the number of layers.
ID: HvS8h1jcTSsm10s9cI%2F2EyMAo5o%3D
LOW No Drop Capabilities for Containers /deployment.yaml: 23
detailsSees if Kubernetes Drop Capabilities exists to ensure containers security context
ID: qdESV2h42EpIjd%2FMgePf0sTjT%2F0%3D
LOW No Drop Capabilities for Containers /deployment.yaml: 38
detailsSees if Kubernetes Drop Capabilities exists to ensure containers security context
ID: sOEI9OJvOpbmWVB2mff6U%2FtRWm4%3D
LOW No Drop Capabilities for Containers /deployment.yaml: 37
detailsSees if Kubernetes Drop Capabilities exists to ensure containers security context
ID: tZt1JJgr4U%2FyY0vaqNR%2FqoSGvHc%3D
LOW Pip install Keeping Cached Packages /Dockerfile: 5
detailsWhen installing packages with pip, the '--no-cache-dir' flag should be set to make Docker images smaller
ID: 0rzE0MA0F1p07VZ0ggmHW1tW%2BBQ%3D
LOW Pod or Container Without LimitRange /deployment.yaml: 7
detailsEach namespace should have a LimitRange policy associated to ensure that resource allocations of Pods, Containers and PersistentVolumeClaims do not...
ID: EQ8XzVt8vqYQYHqKBVxlfS8EXE4%3D
LOW Pod or Container Without LimitRange /deployment.yaml: 6
detailsEach namespace should have a LimitRange policy associated to ensure that resource allocations of Pods, Containers and PersistentVolumeClaims do not...
ID: mdhZWoeXu%2FU7x3jq3YeJC%2BdaQZU%3D
LOW Pod or Container Without ResourceQuota /deployment.yaml: 7
detailsEach namespace should have a ResourceQuota policy associated to limit the total amount of resources Pods, Containers and PersistentVolumeClaims can...
ID: bfajngw1KS5wHs5CK24AvSdWe8c%3D
LOW Pod or Container Without ResourceQuota /deployment.yaml: 6
detailsEach namespace should have a ResourceQuota policy associated to limit the total amount of resources Pods, Containers and PersistentVolumeClaims can...
ID: rhZRyRTo3%2BpGrEp1CuLfJMPHdpQ%3D
LOW Pod or Container Without Security Context /deployment.yaml: 23
detailsA security context defines privilege and access control settings for a Pod or Container
ID: dfd%2Bi0uk5T%2FwKsH9%2B4yMEgDy47w%3D
LOW Root Container Not Mounted Read-only /deployment.yaml: 23
detailsCheck if the root container filesystem is not being mounted read-only.
ID: t5u%2FSfKM49jYcoI8FlCrPoSDHqs%3D
LOW Using Unnamed Build Stages /Dockerfile: 18
details This query is used to ensure that build stages are named. This way even if the Dockerfile is re-ordered, the COPY instruction doesn’t break.
ID: olkvfkwwKDvL%2F8v%2FVhI3VSh4TuY%3D

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file python Pull requests that update python code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants