mirror of
https://git.yoctoproject.org/poky
synced 2026-02-09 02:03:04 +01:00
python3-setuptools: Fix CVE-2024-6345
A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for
remote code execution via its download functions. These functions, which are used to download
packages from URLs provided by users or retrieved from package index servers, are susceptible
to code injection. If these functions are exposed to user-controlled inputs, such as package
URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.
References:
https://nvd.nist.gov/vuln/detail/CVE-2024-6345
Upstream-patch:
88807c7062
(From OE-Core rev: 468c5a4e12b9d38768b00151c55fd27b2b504f3b)
Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
This commit is contained in:
committed by
Steve Sakoman
parent
8637aa34f0
commit
67aa29393d
@@ -9,7 +9,9 @@ inherit pypi python_setuptools_build_meta
|
||||
SRC_URI:append:class-native = " file://0001-conditionally-do-not-fetch-code-by-easy_install.patch"
|
||||
|
||||
SRC_URI += " \
|
||||
file://0001-_distutils-sysconfig.py-make-it-possible-to-substite.patch"
|
||||
file://0001-_distutils-sysconfig.py-make-it-possible-to-substite.patch \
|
||||
file://CVE-2024-6345.patch \
|
||||
"
|
||||
|
||||
SRC_URI[sha256sum] = "5c0806c7d9af348e6dd3777b4f4dbb42c7ad85b190104837488eab9a7c945cf8"
|
||||
|
||||
|
||||
Reference in New Issue
Block a user