Source: python-pip
Version: 25.2+dfsg-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/pypa/pip/pull/13550
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for python-pip.

CVE-2025-8869[0]:
| When extracting a tar archive pip may not check symbolic links point
| into the extraction directory if the tarfile module doesn't
| implement PEP 706. Note that upgrading pip to a "fixed" version for
| this vulnerability doesn't fix all known vulnerabilities that are
| remediated by using a Python version that implements PEP 706.  Note
| that this is a vulnerability in pip's fallback implementation of tar
| extraction for Python versions that don't implement PEP 706 and
| therefore are not secure to all vulnerabilities in the Python
| 'tarfile' module. If you're using a Python version that implements
| PEP 706 then pip doesn't use the "vulnerable" fallback code.
| Mitigations include upgrading to a version of pip that includes the
| fix, upgrading to a Python version that implements PEP 706 (Python
| >=3.9.17, >=3.10.12, >=3.11.4, or >=3.12), applying the linked
| patch, or inspecting source distributions (sdists) before
| installation as is already a best-practice.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-8869
    https://www.cve.org/CVERecord?id=CVE-2025-8869
[1] https://github.com/pypa/pip/pull/13550
[2] https://github.com/pypa/pip/commit/f2b92314da012b9fffa36b3f3e67748a37ef464a
[3] 
https://mail.python.org/archives/list/[email protected]/thread/IF5A3GCJY3VH7BVHJKOWOJFKTW7VFQEN/

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to