Bug 2432090 - CVE-2026-24049 python3.13-setuptools: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking [epel-9]
Summary: CVE-2026-24049 python3.13-setuptools: wheel: Privilege Escalation or Arbitrar...
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Fedora EPEL
Classification: Fedora
Component: python3.13-setuptools
Version: epel9
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
Assignee: Python Maintainers
QA Contact:
URL:
Whiteboard: {"flaws": ["68c36e5e-ac35-42b4-ba4e-e...
Depends On:
Blocks: CVE-2026-24049
TreeView+ depends on / blocked
 
Reported: 2026-01-22 18:09 UTC by Jon Moroney
Modified: 2026-02-25 14:00 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2026-02-25 14:00:16 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Jon Moroney 2026-01-22 18:09:22 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Miro Hrončok 2026-01-23 11:39:39 UTC
The code indeed exists in setuptools. In setuptools-78.1.1/setuptools/_vendor/wheel/cli/unpack.py

We will be checking whether this code is used by setuptools or not.

Comment 2 Karolina Surma 2026-02-25 14:00:16 UTC
Based on Lumir Balhar's investigation made for this version of setuptools here: https://bugzilla.redhat.com/show_bug.cgi?id=2432108: 

The vulnerable wheel.cli.unpack.unpack() function is only used by the wheel CLI tool. Setuptools never imports or calls this function - I verified there are no references to wheel.cli.unpack anywhere in setuptools code outside the vendored wheel package itself.
Setuptools uses its own implementation for unpacking zip archives, and that implementation properly sanitizes target paths, so the same exploit is not possible here.


Note You need to log in before you can comment on or make changes to this bug.