pyp2spec generates working Fedora RPM spec file for Python projects. Prior to version 0.14.1, pyp2spec was writing PyPI package metadata (e.g. the summary field) into the generated spec file without escaping RPM macro directives. When a packager then runs rpmbuild, those directives get evaluated, so a malicious package can execute arbitrary commands on the build machine. This issue has been patched in version 0.14.1.
Project Subscriptions
No data.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-r35x-v8p8-xvhw | pyp2spec is Vulnerable to Code Injection |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 09 May 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pyp2spec generates working Fedora RPM spec file for Python projects. Prior to version 0.14.1, pyp2spec was writing PyPI package metadata (e.g. the summary field) into the generated spec file without escaping RPM macro directives. When a packager then runs rpmbuild, those directives get evaluated, so a malicious package can execute arbitrary commands on the build machine. This issue has been patched in version 0.14.1. | |
| Title | Improper Input Validation leading to Improper Control of Generation of Code ('Code Injection') in pyp2spec | |
| Weaknesses | CWE-20 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-09T03:59:34.741Z
Reserved: 2026-04-26T12:13:55.552Z
Link: CVE-2026-42301
No data.
Status : Received
Published: 2026-05-09T04:16:25.923
Modified: 2026-05-09T04:16:25.923
Link: CVE-2026-42301
No data.
OpenCVE Enrichment
Updated: 2026-05-09T06:00:12Z
Github GHSA