OESA-2025-2098

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-2098
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-2098.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2025-2098
Upstream
Published
2025-09-05T12:39:37Z
Modified
2025-09-05T13:03:40.582291Z
Summary
uv security update
Details

An extremely fast Python package and project manager, written in Rust.

Security Fix(es):

uv is a Python package and project manager written in Rust. In versions 0.8.5 and earlier, remote ZIP archives were handled in a streamwise fashion, and file entries were not reconciled against the archive's central directory. An attacker could contrive a ZIP archive that would extract with legitimate contents on some package installers, and malicious contents on others due to multiple local file entries. An attacker could also contrive a "stacked" ZIP input with multiple internal ZIPs, which would be handled differently by different package installers. The attacker could choose which installer to target in both scenarios. This issue is fixed in version 0.8.6. To work around this issue, users may choose to set UVINSECURENOZIPVALIDATION=1 to revert to the previous behavior.(CVE-2025-54368)

slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the getdisjointmut method incorrectly checked if indices were within the slab's capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using getdisjointmut with indices that might be beyond the slab's actual length.(CVE-2025-55159)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:24.03-LTS-SP2 / uv

Package

Name
uv
Purl
pkg:rpm/openEuler/uv&distro=openEuler-24.03-LTS-SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.8-1.oe2403sp2

Ecosystem specific

{
    "src": [
        "uv-0.8.8-1.oe2403sp2.src.rpm"
    ],
    "x86_64": [
        "uv-0.8.8-1.oe2403sp2.x86_64.rpm"
    ],
    "aarch64": [
        "uv-0.8.8-1.oe2403sp2.aarch64.rpm"
    ]
}