pyp2spec generates working Fedora RPM spec file for Python projects. Prior to version 0.14.1, pyp2spec was writing PyPI package metadata (e.g. the summary field) into the generated spec file without escaping RPM macro directives. When a packager then runs rpmbuild, those directives get evaluated, so a malicious package can execute arbitrary commands on the build machine. This issue has been patched in version 0.14.1.
Metrics
Affected Vendors & Products
References
History
Sun, 10 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Befeleme
Befeleme pyp2spec |
|
| Vendors & Products |
Befeleme
Befeleme pyp2spec |
Sat, 09 May 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pyp2spec generates working Fedora RPM spec file for Python projects. Prior to version 0.14.1, pyp2spec was writing PyPI package metadata (e.g. the summary field) into the generated spec file without escaping RPM macro directives. When a packager then runs rpmbuild, those directives get evaluated, so a malicious package can execute arbitrary commands on the build machine. This issue has been patched in version 0.14.1. | |
| Title | Improper Input Validation leading to Improper Control of Generation of Code ('Code Injection') in pyp2spec | |
| Weaknesses | CWE-20 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-05-09T03:59:34.741Z
Updated: 2026-05-09T03:59:34.741Z
Reserved: 2026-04-26T12:13:55.552Z
Link: CVE-2026-42301
No data.
Status : Received
Published: 2026-05-09T04:16:25.923
Modified: 2026-05-09T04:16:25.923
Link: CVE-2026-42301
No data.
ReportizFlow