cvrf2cusa/cvrf/2024/cvrf-openEuler-SA-2024-1931.xml
Jia Chao 7d8412e76d update 0822
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-08-22 10:38:56 +08:00

122 lines
9.4 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for python-setuptools is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4 and openEuler-24.03-LTS</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2024-1931</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2024-08-02</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2024-08-02</InitialReleaseDate>
<CurrentReleaseDate>2024-08-02</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2024-08-02</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">python-setuptools security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for python-setuptools is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4 and openEuler-24.03-LTS.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Setuptools is a collection of enhancements to the Python distutils that allow you to more easily build and distribute Python packages, especially ones that have dependencies on other packages.
Security Fix(es):
A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.(CVE-2024-6345)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for python-setuptools is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4 and openEuler-24.03-LTS.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">python-setuptools</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://www.openeuler.org/en/security/security-bulletins/detail?id=openEuler-SA-2024-1931</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-6345</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-6345</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-20.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openEuler-20.03-LTS-SP4</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">openEuler-22.03-LTS-SP1</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">openEuler-22.03-LTS-SP3</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="noarch">
<FullProductName ProductID="python-setuptools-44.1.1-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">python-setuptools-44.1.1-3.oe2003sp4.noarch.rpm</FullProductName>
<FullProductName ProductID="python3-setuptools-44.1.1-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">python3-setuptools-44.1.1-3.oe2003sp4.noarch.rpm</FullProductName>
<FullProductName ProductID="python2-setuptools-44.1.1-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">python2-setuptools-44.1.1-3.oe2003sp4.noarch.rpm</FullProductName>
<FullProductName ProductID="python-setuptools-help-44.1.1-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">python-setuptools-help-44.1.1-3.oe2003sp4.noarch.rpm</FullProductName>
<FullProductName ProductID="python3-setuptools-59.4.0-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">python3-setuptools-59.4.0-6.oe2203sp1.noarch.rpm</FullProductName>
<FullProductName ProductID="python-setuptools-59.4.0-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">python-setuptools-59.4.0-6.oe2203sp1.noarch.rpm</FullProductName>
<FullProductName ProductID="python-setuptools-help-59.4.0-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">python-setuptools-help-59.4.0-6.oe2203sp1.noarch.rpm</FullProductName>
<FullProductName ProductID="python3-setuptools-59.4.0-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">python3-setuptools-59.4.0-6.oe2203sp3.noarch.rpm</FullProductName>
<FullProductName ProductID="python-setuptools-help-59.4.0-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">python-setuptools-help-59.4.0-6.oe2203sp3.noarch.rpm</FullProductName>
<FullProductName ProductID="python-setuptools-59.4.0-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">python-setuptools-59.4.0-6.oe2203sp3.noarch.rpm</FullProductName>
<FullProductName ProductID="python3-setuptools-59.4.0-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">python3-setuptools-59.4.0-6.oe2203sp4.noarch.rpm</FullProductName>
<FullProductName ProductID="python-setuptools-59.4.0-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">python-setuptools-59.4.0-6.oe2203sp4.noarch.rpm</FullProductName>
<FullProductName ProductID="python-setuptools-help-59.4.0-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">python-setuptools-help-59.4.0-6.oe2203sp4.noarch.rpm</FullProductName>
<FullProductName ProductID="python3-setuptools-68.0.0-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">python3-setuptools-68.0.0-2.oe2403.noarch.rpm</FullProductName>
<FullProductName ProductID="python-setuptools-68.0.0-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">python-setuptools-68.0.0-2.oe2403.noarch.rpm</FullProductName>
<FullProductName ProductID="python-setuptools-help-68.0.0-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">python-setuptools-help-68.0.0-2.oe2403.noarch.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="python-setuptools-44.1.1-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">python-setuptools-44.1.1-3.oe2003sp4.src.rpm</FullProductName>
<FullProductName ProductID="python-setuptools-59.4.0-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">python-setuptools-59.4.0-6.oe2203sp1.src.rpm</FullProductName>
<FullProductName ProductID="python-setuptools-59.4.0-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">python-setuptools-59.4.0-6.oe2203sp3.src.rpm</FullProductName>
<FullProductName ProductID="python-setuptools-59.4.0-6" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">python-setuptools-59.4.0-6.oe2203sp4.src.rpm</FullProductName>
<FullProductName ProductID="python-setuptools-68.0.0-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">python-setuptools-68.0.0-2.oe2403.src.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.</Note>
</Notes>
<ReleaseDate>2024-08-02</ReleaseDate>
<CVE>CVE-2024-6345</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP4</ProductID>
<ProductID>openEuler-22.03-LTS-SP1</ProductID>
<ProductID>openEuler-22.03-LTS-SP3</ProductID>
<ProductID>openEuler-22.03-LTS-SP4</ProductID>
<ProductID>openEuler-24.03-LTS</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>8.8</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>python-setuptools security update</Description>
<DATE>2024-08-02</DATE>
<URL>https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1931</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>