{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "* SECURITY UPDATE: regex denial of service via crafted HTML\n     - debian/patches/CVE-2022-40897.patch: limit whitespace matching in REL regex\n     - CVE-2022-40897\n   * SECURITY UPDATE: remote code execution via command injection in VCS downloads\n     - debian/patches/CVE-2024-6345.patch: replace os.system with subprocess.check_call\n     - CVE-2024-6345\n   * SECURITY UPDATE: path traversal in download filename resolution\n     - debian/patches/CVE-2025-47273.patch: validate download filename stays within tmpdir\n     - CVE-2025-47273",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776158822",
        "url": "https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776158822"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_alt_python/debian13/advisories/2026/clsa-2026_1776158822.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-14T09:27:44Z",
      "generator": {
        "date": "2026-04-14T09:27:44Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1776158822",
      "initial_release_date": "2026-04-14T09:27:44Z",
      "revision_history": [
        {
          "date": "2026-04-14T09:27:44Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "Fix CVE(s): CVE-2022-40897, CVE-2024-6345, CVE-2025-47273"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Debian 13",
                "product": {
                  "name": "Debian 13",
                  "product_id": "Debian-13",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:debian:debian_linux:13:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Debian"
          }
        ],
        "category": "vendor",
        "name": "Software in the Public Interest, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "alt-python38-setuptools-0:58.3.0-3.all",
                "product": {
                  "name": "alt-python38-setuptools-0:58.3.0-3.all",
                  "product_id": "alt-python38-setuptools-0:58.3.0-3.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/alt-python38-setuptools@58.3.0-3?arch=all&os_name=debian&os_version=13"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-python38-setuptools-wheel-0:58.3.0-3.all",
                "product": {
                  "name": "alt-python38-setuptools-wheel-0:58.3.0-3.all",
                  "product_id": "alt-python38-setuptools-wheel-0:58.3.0-3.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/alt-python38-setuptools-wheel@58.3.0-3?arch=all&os_name=debian&os_version=13"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "all"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-python38-setuptools-0:58.3.0-3.all as a component of Debian 13",
          "product_id": "Debian-13:alt-python38-setuptools-0:58.3.0-3.all"
        },
        "product_reference": "alt-python38-setuptools-0:58.3.0-3.all",
        "relates_to_product_reference": "Debian-13"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-python38-setuptools-wheel-0:58.3.0-3.all as a component of Debian 13",
          "product_id": "Debian-13:alt-python38-setuptools-wheel-0:58.3.0-3.all"
        },
        "product_reference": "alt-python38-setuptools-wheel-0:58.3.0-3.all",
        "relates_to_product_reference": "Debian-13"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-47273",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
      },
      "notes": [
        {
          "category": "description",
          "text": "setuptools is a package that allows users to download, build, install, upgrade, and uninstall Python packages. A path traversal vulnerability in `PackageIndex` is present in setuptools prior to version 78.1.1. An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to remote code execution depending on the context. Version 78.1.1 fixes the issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Debian-13:alt-python38-setuptools-0:58.3.0-3.all",
          "Debian-13:alt-python38-setuptools-wheel-0:58.3.0-3.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-alt-python/cve/CVE-2025-47273"
        },
        {
          "category": "external",
          "summary": "https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88",
          "url": "https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88"
        },
        {
          "category": "external",
          "summary": "https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b",
          "url": "https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b"
        },
        {
          "category": "external",
          "summary": "https://github.com/pypa/setuptools/issues/4946",
          "url": "https://github.com/pypa/setuptools/issues/4946"
        },
        {
          "category": "external",
          "summary": "https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf",
          "url": "https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00035.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00035.html"
        }
      ],
      "release_date": "2025-05-17T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-14T09:27:05.611288Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776158822",
          "product_ids": [
            "Debian-13:alt-python38-setuptools-0:58.3.0-3.all",
            "Debian-13:alt-python38-setuptools-wheel-0:58.3.0-3.all"
          ],
          "url": "https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776158822"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Debian-13:alt-python38-setuptools-0:58.3.0-3.all",
            "Debian-13:alt-python38-setuptools-wheel-0:58.3.0-3.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-40897",
      "cwe": {
        "id": "CWE-1333",
        "name": "Inefficient Regular Expression Complexity"
      },
      "notes": [
        {
          "category": "description",
          "text": "Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Debian-13:alt-python38-setuptools-0:58.3.0-3.all",
          "Debian-13:alt-python38-setuptools-wheel-0:58.3.0-3.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-alt-python/cve/CVE-2022-40897"
        },
        {
          "category": "external",
          "summary": "https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200",
          "url": "https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200"
        },
        {
          "category": "external",
          "summary": "https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be",
          "url": "https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be"
        },
        {
          "category": "external",
          "summary": "https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1",
          "url": "https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H/"
        },
        {
          "category": "external",
          "summary": "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/",
          "url": "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/"
        },
        {
          "category": "external",
          "summary": "https://pyup.io/vulnerabilities/CVE-2022-40897/52495/",
          "url": "https://pyup.io/vulnerabilities/CVE-2022-40897/52495/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230214-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20230214-0001/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20240621-0006/",
          "url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/09/msg00018.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00018.html"
        }
      ],
      "release_date": "2022-12-23T00:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-14T09:27:05.611288Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776158822",
          "product_ids": [
            "Debian-13:alt-python38-setuptools-0:58.3.0-3.all",
            "Debian-13:alt-python38-setuptools-wheel-0:58.3.0-3.all"
          ],
          "url": "https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776158822"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Debian-13:alt-python38-setuptools-0:58.3.0-3.all",
            "Debian-13:alt-python38-setuptools-wheel-0:58.3.0-3.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2024-6345",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code ('Code Injection')"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Debian-13:alt-python38-setuptools-0:58.3.0-3.all",
          "Debian-13:alt-python38-setuptools-wheel-0:58.3.0-3.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-alt-python/cve/CVE-2024-6345"
        }
      ],
      "release_date": "2024-07-15T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-14T09:27:05.611288Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776158822",
          "product_ids": [
            "Debian-13:alt-python38-setuptools-0:58.3.0-3.all",
            "Debian-13:alt-python38-setuptools-wheel-0:58.3.0-3.all"
          ],
          "url": "https://cve.tuxcare.com/els-alt-python/releases/CLSA-2026:1776158822"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Debian-13:alt-python38-setuptools-0:58.3.0-3.all",
            "Debian-13:alt-python38-setuptools-wheel-0:58.3.0-3.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}