{"schema_version":"1.7.2","id":"OESA-2026-1446","modified":"2026-02-28T12:44:27Z","published":"2026-02-28T12:44:27Z","upstream":["CVE-2026-1703"],"summary":"python-pip security update","details":"pip is the package installer for Python. You can use pip to install packages from the Python Package Index and other indexes. %global bashcompdir %(b=$(pkg-config --variable=completionsdir bash-completion 2&amp;gt;/dev/null); echo ${b:-/bash_completion.d}) Name:           python-pip Version:        23.3.1 Release:        6 Summary:        A tool for installing and managing Python packages License:        MIT and Python and ASL 2.0 and BSD and ISC and LGPLv2 and MPLv2.0 and (ASL 2.0 or BSD) URL:            http://www.pip-installer.org Source0:          Source1:        pip.loongarch.conf BuildArch:      noarch Patch1:         remove-existing-dist-only-if-path-conflicts. Patch6000:      dummy-certifi.patch Patch6001:      backport-CVE-2023-45803-Made-body-stripped-from-HTTP-requests.patch Patch6002:      backport-CVE-2024-37891-Strip-Proxy-Authorization-header-on-redirects.patch Patch6003:      backport-CVE-2024-47081.patch Patch6004:      backport-CVE-2025-50181.patch Patch6005:      backport-CVE-2025-8869.patch\r\n\r\nSecurity Fix(es):\n\nWhen pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn&apos;t able to inject or overwrite executable files in typical situations.(CVE-2026-1703)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"python-pip","purl":"pkg:rpm/openEuler/python-pip&distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"21.3.1-14.oe2203sp4"}]}],"ecosystem_specific":{"noarch":["python-pip-help-21.3.1-14.oe2203sp4.noarch.rpm","python-pip-wheel-21.3.1-14.oe2203sp4.noarch.rpm","python3-pip-21.3.1-14.oe2203sp4.noarch.rpm"],"src":["python-pip-21.3.1-14.oe2203sp4.src.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1446"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-1703"}],"database_specific":{"severity":"Low"}}
