mirror of https://github.com/astral-sh/uv
Add links to CHANGELOG (#15140)
This commit is contained in:
parent
9defbce7bd
commit
0011e91774
|
|
@ -4,7 +4,7 @@
|
|||
|
||||
## 0.8.6
|
||||
|
||||
This release contains hardening measures to address differentials in behavior between uv and Python's built-in ZIP parser (CVE-2025-54368).
|
||||
This release contains hardening measures to address differentials in behavior between uv and Python's built-in ZIP parser ([CVE-2025-54368](https://github.com/astral-sh/uv/security/advisories/GHSA-8qf3-x8v5-2pj8)).
|
||||
|
||||
Prior to this release, attackers could construct ZIP files that would be extracted differently by pip, uv, and other tools. As a result, ZIPs could be constructed that would be considered harmless by (e.g.) scanners, but contain a malicious payload when extracted by uv. As of v0.8.6, uv now applies additional checks to reject such ZIPs.
|
||||
|
||||
|
|
@ -14,6 +14,11 @@ Although the practical risk of exploitation is low, we take the _hypothetical_ r
|
|||
|
||||
These changes have been validated against the top 15,000 PyPI packages; however, it's plausible that a non-malicious ZIP could be falsely rejected with this additional hardening. As an escape hatch, users who do encounter breaking changes can enable `UV_INSECURE_NO_ZIP_VALIDATION` to restore the previous behavior. If you encounter such a rejection, please file an issue in uv and to the upstream package.
|
||||
|
||||
For additional information, please refer to the following blog posts:
|
||||
|
||||
* [Astral: uv security advisory: ZIP payload obfuscation](https://astral.sh/blog/uv-security-advisory-cve-2025-54368)
|
||||
* [PyPI: Preventing ZIP parser confusion attacks on Python package installers](https://blog.pypi.org/posts/2025-08-07-wheel-archive-confusion-attacks/)
|
||||
|
||||
### Security
|
||||
|
||||
- Harden ZIP streaming to reject repeated entries and other malformed ZIP files ([#15136](https://github.com/astral-sh/uv/pull/15136))
|
||||
|
|
|
|||
Loading…
Reference in New Issue