Source: python-virtualenv
Version: 20.35.4+ds-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/pypa/virtualenv/pull/3013
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for python-virtualenv.

CVE-2026-22702[0]:
| virtualenv is a tool for creating isolated virtual python
| environments. Prior to version 20.36.1, TOCTOU (Time-of-Check-Time-
| of-Use) vulnerabilities in virtualenv allow local attackers to
| perform symlink-based attacks on directory creation operations. An
| attacker with local access can exploit a race condition between
| directory existence checks and creation to redirect virtualenv's
| app_data and lock file operations to attacker-controlled locations.
| This issue has been patched in version 20.36.1.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-22702
    https://www.cve.org/CVERecord?id=CVE-2026-22702
[1] https://github.com/pypa/virtualenv/pull/3013
[2] https://github.com/pypa/virtualenv/security/advisories/GHSA-597g-3phw-6986
[3] 
https://github.com/pypa/virtualenv/commit/dec4cec5d16edaf83a00a658f32d1e032661cebc

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to