Bug 2432090
| Summary: | CVE-2026-24049 python3.13-setuptools: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking [epel-9] | ||
|---|---|---|---|
| Product: | [Fedora] Fedora EPEL | Reporter: | Jon Moroney <jmoroney> |
| Component: | python3.13-setuptools | Assignee: | Python Maintainers <python-maint> |
| Status: | CLOSED NOTABUG | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | epel9 | CC: | ksurma, mhroncok, python-maint, python-packagers-sig |
| Target Milestone: | --- | Keywords: | Security, SecurityTracking |
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | {"flaws": ["68c36e5e-ac35-42b4-ba4e-ef0edd5b3f06"]} | ||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2026-02-25 14:00:16 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 2431959 | ||
|
Description
Jon Moroney
2026-01-22 18:09:22 UTC
The code indeed exists in setuptools. In setuptools-78.1.1/setuptools/_vendor/wheel/cli/unpack.py We will be checking whether this code is used by setuptools or not. Based on Lumir Balhar's investigation made for this version of setuptools here: https://bugzilla.redhat.com/show_bug.cgi?id=2432108: The vulnerable wheel.cli.unpack.unpack() function is only used by the wheel CLI tool. Setuptools never imports or calls this function - I verified there are no references to wheel.cli.unpack anywhere in setuptools code outside the vendored wheel package itself. Setuptools uses its own implementation for unpacking zip archives, and that implementation properly sanitizes target paths, so the same exploit is not possible here. |