pyp2spec generates working Fedora RPM spec file for Python projects. Prior to version 0.14.1, pyp2spec was writing PyPI package metadata (e.g. the summary field) into the generated spec file without escaping RPM macro directives. When a packager then runs rpmbuild, those directives get evaluated, so a malicious package can execute arbitrary commands on the build machine. This issue has been patched in version 0.14.1.
Metrics
Affected Vendors & Products
References
History
Sat, 09 May 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pyp2spec generates working Fedora RPM spec file for Python projects. Prior to version 0.14.1, pyp2spec was writing PyPI package metadata (e.g. the summary field) into the generated spec file without escaping RPM macro directives. When a packager then runs rpmbuild, those directives get evaluated, so a malicious package can execute arbitrary commands on the build machine. This issue has been patched in version 0.14.1. | |
| Title | Improper Input Validation leading to Improper Control of Generation of Code ('Code Injection') in pyp2spec | |
| Weaknesses | CWE-20 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-09T03:59:34.741Z
Reserved: 2026-04-26T12:13:55.552Z
Link: CVE-2026-42301
No data.
Status : Received
Published: 2026-05-09T04:16:25.923
Modified: 2026-05-09T04:16:25.923
Link: CVE-2026-42301
No data.
OpenCVE Enrichment
Updated: 2026-05-09T06:00:12Z