{"schema_version":"1.7.2","id":"OESA-2025-2741","modified":"2025-11-28T12:51:06Z","published":"2025-11-28T12:51:06Z","upstream":["CVE-2025-8869"],"summary":"python-pip security update","details":"pip is the package installer for Python. You can use pip to install packages from the Python Package Index and other indexes. %global bashcompdir %(b=$(pkg-config --variable=completionsdir bash-completion 2&amp;gt;/dev/null); echo ${b:-/bash_completion.d}) Name:           python-pip Version:        20.2.2 Release:        4 Summary:        A tool for installing and managing Python packages License:        MIT and Python and ASL 2.0 and BSD and ISC and LGPLv2 and MPLv2.0 and (ASL 2.0 or BSD) URL:            http://www.pip-installer.org Source0:        https://files.pythonhosted.org/packages/source/p/pip/pip-.tar.gz BuildArch:      noarch Patch1:         allow-stripping-given-prefix-from-wheel-RECORD-files. Patch2:         emit-a-warning-when-running-with-root-privileges.patch Patch3:         remove-existing-dist-only-if-path-conflicts.patch Patch6000:      dummy-certifi.patch Patch6001:      backport-CVE-2021-3572.patch\r\n\r\nSecurity Fix(es):\n\nWhen extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn&apos;t implement PEP 706.\nNote that upgrading pip to a &quot;fixed&quot; version for this vulnerability doesn&apos;t fix all known vulnerabilities that are remediated by using a Python version that implements PEP 706.\n\nNote that this is a vulnerability in pip&apos;s fallback implementation of tar extraction for Python versions that don&apos;t implement PEP 706\nand therefore are not secure to all vulnerabilities in the Python &apos;tarfile&apos; module. If you&apos;re using a Python version that implements PEP 706\nthen pip doesn&apos;t use the &quot;vulnerable&quot; fallback code.\n\nMitigations include upgrading to a version of pip that includes the fix, upgrading to a Python version that implements PEP 706 (Python &gt;=3.9.17, &gt;=3.10.12, &gt;=3.11.4, or &gt;=3.12),\napplying the linked patch, or inspecting source distributions (sdists) before installation as is already a best-practice.(CVE-2025-8869)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"python-pip","purl":"pkg:rpm/openEuler/python-pip&distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"21.3.1-12.oe2203sp4"}]}],"ecosystem_specific":{"noarch":["python-pip-help-21.3.1-12.oe2203sp4.noarch.rpm","python-pip-wheel-21.3.1-12.oe2203sp4.noarch.rpm","python3-pip-21.3.1-12.oe2203sp4.noarch.rpm"],"src":["python-pip-21.3.1-12.oe2203sp4.src.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2741"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-8869"}],"database_specific":{"severity":"Medium"}}
