This bug was fixed in the package python-pip - 22.0.2+dfsg-1ubuntu0.7

---------------
python-pip (22.0.2+dfsg-1ubuntu0.7) jammy-security; urgency=medium

  * SECURITY UPDATE: Unintended leak of Proxy-Authorization header
    (LP: #2031880)
    - debian/patches/CVE-2023-32681.patch: don't attach header to redirects
      with an HTTPS destination in requests/sessions.py,
      tests/test_requests.py.
    - CVE-2023-32681
  * SECURITY UPDATE: resource exhaustion
    - debian/patches/CVE-2024-3651.patch: checks input before processing
    - CVE-2024-3651
  * SECURITY UPDATE: Information Leak
    - debian/patches/CVE-2024-47081.patch: Only use hostname to do netrc
      lookup instead of netloc
    - CVE-2024-47081

 -- Hlib Korzhynskyy <[email protected]>  Mon, 22 Sep 2025
17:14:33 -0230

** Changed in: python-pip (Ubuntu Jammy)
       Status: New => Fix Released

** CVE added: https://cve.org/CVERecord?id=CVE-2024-3651

** CVE added: https://cve.org/CVERecord?id=CVE-2024-47081

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2031880

Title:
   CVE-2023-32681 - python-pip fix is improper

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python-pip/+bug/2031880/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to