Package: release.debian.org
Severity: normal
Tags: bookworm
X-Debbugs-Cc: setupto...@packages.debian.org
Control: affects -1 + src:setuptools
User: release.debian....@packages.debian.org
Usertags: pu

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

[ Reason ]
CVE-2024-6345 has been fixed in oldstable and testing/unstable, but it has not
yet been fixed in Bookworm. This update intends to provide a fix for users of
Debian Bookworm as well.

Matthias agreed that I provide the update with my Debian LTS hat on.

[ Impact ]
If the update is not approved, users will continue to be vulnerable to
CVE-2024-6345.

[ Tests ]
The fix for the CVE also includes changes to the test cases covering the
affected code. Unfortunately, the Debian project has not implemented running
the upstream testsuite. The reason is probably that it depends on Python
modules which have not been packaged. Thus, I successfully ran the changed
test-cases locally with pytest after applying a few changes. I also
successfully attempted a module installation.

[ Risks ]
There is always a risk of regression. But the changed test cases ran
successfully. Furthermore, the update has also been provided to Bullseye via
DLA-3876-1 in September. There haven't been any reports of regressions or
issues.

[ Checklist ]
  [x] *all* changes are documented in the d/changelog
  [x] I reviewed all changes and I approve them
  [x] attach debdiff against the package in (old)stable
  [x] the issue is verified as fixed in unstable

[ Changes ]
The usage of os.system() has been replaced by subprocess.check_call().
Furthermore, the code handling the various schemes has been modernized and
consolidated.

The test cases were adjusted to the changes mentioned above.

[ Other info ]
The patch contains links to the upstream bug report and patch.

-----BEGIN PGP SIGNATURE-----
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=e+IS
-----END PGP SIGNATURE-----

Reply via email to