python3.12-wheel-0.41.2-4.el8_10
エラータID: AXSA:2026-155:02
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking (CVE-2026-24049)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-24049
wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.40.0 through 0.46.1, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.
Update packages.
wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.40.0 through 0.46.1, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.
N/A
SRPMS
- python3.12-wheel-0.41.2-4.el8_10.src.rpm
MD5: b0322aca4ec39f2e6210df319c64ddb4
SHA-256: e2cb95587f2e01d8cecafba747db399fe539bc76dad8547a8c3ae44eeb5d33ac
Size: 108.24 kB
Asianux Server 8 for x86_64
- python3.12-wheel-0.41.2-4.el8_10.noarch.rpm
MD5: a5b2580f3e00c07a99bfc6581db03911
SHA-256: a858c907e37429c9369b4f49bde1c54a9c5c4a99f0dc6511fe363e6d1cf1a94b
Size: 147.75 kB - python3.12-wheel-wheel-0.41.2-4.el8_10.noarch.rpm
MD5: 842b3615b035b831aec6e73bd4c6400b
SHA-256: 42db193f9e53190fec41f51eb851b657842a7172d966c6c78d588f6a45cac3e3
Size: 69.91 kB