{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "CVE-2024-6345: fix code injection vulnerability in package download functions\n- CVE-2025-47273: fix path traversal in PackageIndex.download leading to\n  arbitrary file write",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/almalinux9.2esu/advisories/2025/clsa-2025_1765801059.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765801059",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765801059"
      }
    ],
    "tracking": {
      "current_release_date": "2025-12-15T12:18:16Z",
      "generator": {
        "date": "2025-12-15T12:18:16Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1765801059",
      "initial_release_date": "2025-12-15T12:18:16Z",
      "revision_history": [
        {
          "date": "2025-12-15T12:18:16Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "python-setuptools: Fix of 2 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "AlmaLinux 9.2",
                "product": {
                  "name": "AlmaLinux 9.2",
                  "product_id": "AlmaLinux-9.2",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:almalinux:almalinux:9.2:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "AlmaLinux"
          }
        ],
        "category": "vendor",
        "name": "AlmaLinux OS Foundation"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "python3-setuptools-0:53.0.0-12.el9.tuxcare.els1.noarch",
                "product": {
                  "name": "python3-setuptools-0:53.0.0-12.el9.tuxcare.els1.noarch",
                  "product_id": "python3-setuptools-0:53.0.0-12.el9.tuxcare.els1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/python3-setuptools@53.0.0-12.el9.tuxcare.els1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-setuptools-wheel-0:53.0.0-12.el9.tuxcare.els1.noarch",
                "product": {
                  "name": "python3-setuptools-wheel-0:53.0.0-12.el9.tuxcare.els1.noarch",
                  "product_id": "python3-setuptools-wheel-0:53.0.0-12.el9.tuxcare.els1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/python3-setuptools-wheel@53.0.0-12.el9.tuxcare.els1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-setuptools-0:53.0.0-12.el9.tuxcare.els1.noarch as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:python3-setuptools-0:53.0.0-12.el9.tuxcare.els1.noarch"
        },
        "product_reference": "python3-setuptools-0:53.0.0-12.el9.tuxcare.els1.noarch",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-setuptools-wheel-0:53.0.0-12.el9.tuxcare.els1.noarch as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:python3-setuptools-wheel-0:53.0.0-12.el9.tuxcare.els1.noarch"
        },
        "product_reference": "python3-setuptools-wheel-0:53.0.0-12.el9.tuxcare.els1.noarch",
        "relates_to_product_reference": "AlmaLinux-9.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-47273",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
      },
      "notes": [
        {
          "category": "description",
          "text": "setuptools is a package that allows users to download, build, install, upgrade, and uninstall Python packages. A path traversal vulnerability in `PackageIndex` is present in setuptools prior to version 78.1.1. An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to remote code execution depending on the context. Version 78.1.1 fixes the issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:python3-setuptools-0:53.0.0-12.el9.tuxcare.els1.noarch",
          "AlmaLinux-9.2:python3-setuptools-wheel-0:53.0.0-12.el9.tuxcare.els1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-47273"
        },
        {
          "category": "external",
          "summary": "https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88",
          "url": "https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88"
        },
        {
          "category": "external",
          "summary": "https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b",
          "url": "https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b"
        },
        {
          "category": "external",
          "summary": "https://github.com/pypa/setuptools/issues/4946",
          "url": "https://github.com/pypa/setuptools/issues/4946"
        },
        {
          "category": "external",
          "summary": "https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf",
          "url": "https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00035.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00035.html"
        }
      ],
      "release_date": "2025-05-17T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-15T12:17:41.321078Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765801059",
          "product_ids": [
            "AlmaLinux-9.2:python3-setuptools-0:53.0.0-12.el9.tuxcare.els1.noarch",
            "AlmaLinux-9.2:python3-setuptools-wheel-0:53.0.0-12.el9.tuxcare.els1.noarch"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765801059"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:python3-setuptools-0:53.0.0-12.el9.tuxcare.els1.noarch",
            "AlmaLinux-9.2:python3-setuptools-wheel-0:53.0.0-12.el9.tuxcare.els1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-6345",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code ('Code Injection')"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:python3-setuptools-0:53.0.0-12.el9.tuxcare.els1.noarch",
          "AlmaLinux-9.2:python3-setuptools-wheel-0:53.0.0-12.el9.tuxcare.els1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-6345"
        }
      ],
      "release_date": "2024-07-15T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-15T12:17:41.321078Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765801059",
          "product_ids": [
            "AlmaLinux-9.2:python3-setuptools-0:53.0.0-12.el9.tuxcare.els1.noarch",
            "AlmaLinux-9.2:python3-setuptools-wheel-0:53.0.0-12.el9.tuxcare.els1.noarch"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765801059"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:python3-setuptools-0:53.0.0-12.el9.tuxcare.els1.noarch",
            "AlmaLinux-9.2:python3-setuptools-wheel-0:53.0.0-12.el9.tuxcare.els1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}