{"id":"AZL-74237","summary":"CVE-2026-22702 affecting package python-virtualenv 20.25.0-3","details":"virtualenv is a tool for creating isolated virtual python environments. Prior to version 20.36.1, TOCTOU (Time-of-Check-Time-of-Use) vulnerabilities in virtualenv allow local attackers to perform symlink-based attacks on directory creation operations. An attacker with local access can exploit a race condition between directory existence checks and creation to redirect virtualenv's app_data and lock file operations to attacker-controlled locations. This issue has been patched in version 20.36.1.","modified":"2026-04-21T04:38:41.485554Z","published":"2026-01-10T07:16:02Z","upstream":["CVE-2026-22702"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-22702"}],"affected":[{"package":{"name":"python-virtualenv","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/python-virtualenv"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"last_affected":"20.25.0-3"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-74237.json"}}],"schema_version":"1.7.5"}