<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for python39-setuptools</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:2906-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-08-14T09:04:09Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-08-14T09:04:09Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-08-14T09:04:09Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for python39-setuptools</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for python39-setuptools fixes the following issues:

- CVE-2024-6345: Fixed code execution via download functions in the package_index module (bsc#1228105)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container containers/python:3.9-2024-2906,Image python_15_6-2024-2906,SUSE-2024-2906,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2906,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2906,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2906,SUSE-Storage-7.1-2024-2906,openSUSE-SLE-15.5-2024-2906,openSUSE-SLE-15.6-2024-2906</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242906-1/</URL>
      <Description>Link for SUSE-SU-2024:2906-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-August/019190.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:2906-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228105</URL>
      <Description>SUSE Bug 1228105</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-6345/</URL>
      <Description>SUSE CVE CVE-2024-6345 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container containers/python:3.9">
      <Branch Type="Product Name" Name="Container containers/python:3.9">
        <FullProductName ProductID="Container containers/python:3.9">Container containers/python:3.9</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image python_15_6">
      <Branch Type="Product Name" Name="Image python_15_6">
        <FullProductName ProductID="Image python_15_6">Image python_15_6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Enterprise Storage 7.1">
      <Branch Type="Product Name" Name="SUSE Enterprise Storage 7.1">
        <FullProductName ProductID="SUSE Enterprise Storage 7.1" CPE="cpe:/o:suse:ses:7.1">SUSE Enterprise Storage 7.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp3">SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp3">SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3" CPE="cpe:/o:suse:sles_sap:15:sp3">SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="python39-setuptools-44.1.1-150300.7.9.1">
      <FullProductName ProductID="python39-setuptools-44.1.1-150300.7.9.1">python39-setuptools-44.1.1-150300.7.9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="python39-setuptools-44.1.1-150300.7.9.1" RelationType="Default Component Of" RelatesToProductReference="Container containers/python:3.9">
      <FullProductName ProductID="Container containers/python:3.9:python39-setuptools-44.1.1-150300.7.9.1">python39-setuptools-44.1.1-150300.7.9.1 as a component of Container containers/python:3.9</FullProductName>
    </Relationship>
    <Relationship ProductReference="python39-setuptools-44.1.1-150300.7.9.1" RelationType="Default Component Of" RelatesToProductReference="Image python_15_6">
      <FullProductName ProductID="Image python_15_6:python39-setuptools-44.1.1-150300.7.9.1">python39-setuptools-44.1.1-150300.7.9.1 as a component of Image python_15_6</FullProductName>
    </Relationship>
    <Relationship ProductReference="python39-setuptools-44.1.1-150300.7.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:python39-setuptools-44.1.1-150300.7.9.1">python39-setuptools-44.1.1-150300.7.9.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="python39-setuptools-44.1.1-150300.7.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-setuptools-44.1.1-150300.7.9.1">python39-setuptools-44.1.1-150300.7.9.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="python39-setuptools-44.1.1-150300.7.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:python39-setuptools-44.1.1-150300.7.9.1">python39-setuptools-44.1.1-150300.7.9.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="python39-setuptools-44.1.1-150300.7.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-setuptools-44.1.1-150300.7.9.1">python39-setuptools-44.1.1-150300.7.9.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="python39-setuptools-44.1.1-150300.7.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:python39-setuptools-44.1.1-150300.7.9.1">python39-setuptools-44.1.1-150300.7.9.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="python39-setuptools-44.1.1-150300.7.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:python39-setuptools-44.1.1-150300.7.9.1">python39-setuptools-44.1.1-150300.7.9.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.</Note>
    </Notes>
    <CVE>CVE-2024-6345</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container containers/python:3.9:python39-setuptools-44.1.1-150300.7.9.1</ProductID>
        <ProductID>Image python_15_6:python39-setuptools-44.1.1-150300.7.9.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:python39-setuptools-44.1.1-150300.7.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-setuptools-44.1.1-150300.7.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:python39-setuptools-44.1.1-150300.7.9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-setuptools-44.1.1-150300.7.9.1</ProductID>
        <ProductID>openSUSE Leap 15.5:python39-setuptools-44.1.1-150300.7.9.1</ProductID>
        <ProductID>openSUSE Leap 15.6:python39-setuptools-44.1.1-150300.7.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242906-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-6345.html</URL>
        <Description>CVE-2024-6345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228105</URL>
        <Description>SUSE Bug 1228105</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
