Skip to content

Conversation

sethmlarson
Copy link
Member

Applies the patch generated from the GHSA which we couldn't merge as no one on the team had sufficient permissions.

@sigmavirus24 sigmavirus24 merged commit 96ba401 into psf:main Jun 4, 2025
29 checks passed
@sethmlarson sethmlarson deleted the ghsa-9hjg-9r4m-mvj7 branch June 4, 2025 15:43
amine-malloul-gira pushed a commit to gira-de/splat that referenced this pull request Jun 10, 2025
This update addresses the following vulnerabilities:

- ### Impact  Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs.  ### Workarounds For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on your Requests Session ([docs](https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env)).  ### References psf/requests#6965 https://seclists.org/fulldisclosure/2025/Jun/2
  - Aliases: CVE-2024-47081
  - Recommendation: 2.32.4
bmwiedemann pushed a commit to bmwiedemann/openSUSE that referenced this pull request Jun 10, 2025
https://build.opensuse.org/request/show/1282999
by user dgarcia + anag_factory
- Add CVE-2024-47081.patch upstream patch, fixes netrc credential leak
  (gh#psf/requests#6965, CVE-2024-47081, bsc#1244039)
azmeuk added a commit to numerique-gouv/b3desk that referenced this pull request Sep 10, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants