Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. uv
  4. ›
  5. GHSA-pqhf-p39g-3x64

GHSA-pqhf-p39g-3x64: uv allows ZIP payload obfuscation through parsing differentials

October 29, 2025

In versions 0.9.5 and earlier of uv, ZIP archives were handled in a manner that enabled two parsing differentials against other components of the Python packaging ecosystem:

  1. Central directory entries in a ZIP archive can contain comment fields. However, uv would assume that these fields were not present, since they aren’t widely used. Consequently, a ZIP archive could be constructed where uv would interpret the contents of a central directory comment field as ZIP control structures (such as a new central directory entry), rather than skipping over them.
  2. Both local file entries and central directory entries contain filename fields, which are used to place archive members on disk. These fields are arbitrary sequences of bytes, and may therefore be invalid or ambiguous. For example, they may contain ASCII null bytes, in which case different ZIP extractors behave differently: Python’s zipfile module truncates the filename at the first null, while uv would skip (not extract) any archive members whose filenames contained nulls. Because of this difference, a ZIP archive could be constructed that would extract differently across different Python package installers.

In both cases, the outcome is that an attacker may be able to produce a ZIP with a consistent digest that expands differently with different Python package installers.

Like with GHSA-8qf3-x8v5-2pj8, the impact of these differentials is limited by a number of factors:

  • To be compromised via this vulnerability, user interaction of some sort is required. In particular, the user must run uv pip install $package or similar with an attacker-controlled $package. When using wheel distributions, installation of the malicious package is not sufficient for execution of malicious code, the vicim would need to perform a separate invocation, e.g., python -c "import $package".
  • If a ZIP-based source distribution (which are less common than tarball source distributions), is encountered, malicious code can be executed during package resolution or installation. uv may invoke the malicious code when building the source distribution into a wheel.

References

  • github.com/advisories/GHSA-pqhf-p39g-3x64
  • github.com/astral-sh/uv
  • github.com/astral-sh/uv/commit/da659fee4898a73dbc75070f3e82d49f745e4628
  • github.com/astral-sh/uv/security/advisories/GHSA-pqhf-p39g-3x64

Code Behaviors & Features

Detect and mitigate GHSA-pqhf-p39g-3x64 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.9.6

Fixed versions

  • 0.9.6

Solution

Upgrade to version 0.9.6 or above.

Weakness

  • CWE-20: Improper Input Validation
  • CWE-436: Interpretation Conflict

Source file

pypi/uv/GHSA-pqhf-p39g-3x64.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Thu, 13 Nov 2025 00:18:34 +0000.