{"id":"USN-4601-1","summary":"python-pip vulnerability","details":"It was discovered that pip did not properly sanitize the filename during\npip install. A remote attacker could possible use this issue to read and \nwrite arbitrary files on the host filesystem as root, resulting in a \ndirectory traversal attack. (CVE-2019-20916)\n","modified":"2026-04-24T09:14:12.134792Z","published":"2020-10-22T22:18:11Z","related":["UBUNTU-CVE-2019-20916"],"upstream":["CVE-2019-20916","UBUNTU-CVE-2019-20916"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4601-1"}],"affected":[{"package":{"name":"python-pip","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/python-pip@9.0.1-2.3~ubuntu1.18.04.4?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.0.1-2.3~ubuntu1.18.04.4"}]}],"versions":["9.0.1-2","9.0.1-2.3~ubuntu1","9.0.1-2.3~ubuntu1.18.04.1","9.0.1-2.3~ubuntu1.18.04.2","9.0.1-2.3~ubuntu1.18.04.3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"python-pip","binary_version":"9.0.1-2.3~ubuntu1.18.04.4"},{"binary_name":"python-pip-whl","binary_version":"9.0.1-2.3~ubuntu1.18.04.4"},{"binary_name":"python3-pip","binary_version":"9.0.1-2.3~ubuntu1.18.04.4"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4601-1.json"}}],"schema_version":"1.7.5"}