Bug 2432108
| Summary: | CVE-2026-24049 python-setuptools: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking [fedora-43] | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Jon Moroney <jmoroney> |
| Component: | python-setuptools | Assignee: | Lumír Balhar <lbalhar> |
| Status: | CLOSED NOTABUG | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | 43 | CC: | cstratak, mhroncok, python-maint, python-packagers-sig, thrnciar |
| Target Milestone: | --- | Keywords: | Security, SecurityTracking |
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | {"flaws": ["68c36e5e-ac35-42b4-ba4e-ef0edd5b3f06"]} | ||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2026-01-26 12:48:22 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 2431959 | ||
|
Description
Jon Moroney
2026-01-22 18:11:18 UTC
The code indeed exists in setuptools. In setuptools-78.1.1/setuptools/_vendor/wheel/cli/unpack.py We will be checking whether this code is used by setuptools or not. The vulnerable wheel.cli.unpack.unpack() function is only used by the wheel CLI tool. Setuptools never imports or calls this function - I verified there are no references to wheel.cli.unpack anywhere in setuptools code outside the vendored wheel package itself. Setuptools uses its own implementation for unpacking zip archives, and that implementation properly sanitizes target paths, so the same exploit is not possible here. |