Source: wheel
Version: 0.46.1-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for wheel.

CVE-2026-24049[0]:
| wheel is a command line tool for manipulating Python wheel files, as
| defined in PEP 427. In versions 0.46.1 and below, the unpack
| function is vulnerable to file permission modification through
| mishandling of file permissions after extraction. The logic blindly
| trusts the filename from the archive header for the chmod operation,
| even though the extraction process itself might have sanitized the
| path. Attackers can craft a malicious wheel file that, when
| unpacked, changes the permissions of critical system files (e.g.,
| /etc/passwd, SSH keys, config files), allowing for Privilege
| Escalation or arbitrary code execution by modifying now-writable
| scripts. This issue has been fixed in version 0.46.2.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-24049
    https://www.cve.org/CVERecord?id=CVE-2026-24049
[1] https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx
[2] 
https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to