GHSA-w476-p2h3-79g9: uv has differential in tar extraction with PAX headers
In versions 0.9.4 and earlier of uv, tar archives containing PAX headers with file size overrides were not handled properly. As a result, an attacker could contrive a source distribution (as a tar archive) that would extract differently when installed via uv versus other Python package installers.
The underlying parsing differential here originates with astral-tokio-tar, which disclosed this vulnerability as CVE-2025-62518.
In practice, the impact of this vulnerability is low: only source distributions can be formatted as tar archives, and source distributions execute arbitrary code at build/installation time by definition. Consequently, a parser differential in tar extraction is strictly less powerful than the capabilities already exposed to an attacker who has the ability to control source distributions.
However, this particular source of malleability in source distributions is unintentional and not operating by design, and therefore we consider it a vulnerability despite its overlap in capabilities with intended behavior.
References
- github.com/advisories/GHSA-j5gw-2vrg-8fgx
- github.com/advisories/GHSA-w476-p2h3-79g9
- github.com/astral-sh/uv
- github.com/astral-sh/uv/commit/ae450662d1546e9853f67a8c61a506d3a892d963
- github.com/astral-sh/uv/pull/16387
- github.com/astral-sh/uv/releases/tag/0.9.5
- github.com/astral-sh/uv/security/advisories/GHSA-w476-p2h3-79g9
Code Behaviors & Features
Detect and mitigate GHSA-w476-p2h3-79g9 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →