Bugzilla – Full Text Bug Listing |
Summary: | VUL-0: CVE-2022-29217: python27-PyJWT,python-PyJWT: Key confusion through non-blocklisted public key formats | ||
---|---|---|---|
Product: | [Novell Products] SUSE Security Incidents | Reporter: | Thomas Leroy <thomas.leroy> |
Component: | Incidents | Assignee: | Security Team bot <security-team> |
Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
Severity: | Major | ||
Priority: | P3 - Medium | CC: | carlos.lopez, mcepl, meissner, security-team, stoyan.manolov |
Version: | unspecified | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Other | ||
URL: | https://smash.suse.de/issue/332393/ | ||
Whiteboard: | CVSSv3.1:SUSE:CVE-2022-29217:7.5:(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | ||
Found By: | Security Response Team | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Description
Thomas Leroy
2022-05-20 09:37:19 UTC
The following codestreams should be affected: - SUSE:SLE-12-SP1:Update - SUSE:SLE-12-SP3:Update:Products:Cloud8:Update - SUSE:SLE-12-SP4:Update:Products:Cloud9:Update - SUSE:SLE-15:Update - SUSE:SLE-15-SP1:Update - SUSE:SLE-15-SP2:Update SUSE:SLE-11-SP1:Update:Teradata/python27-PyJWT is not affected (In reply to Thomas Leroy from comment #1) > The following codestreams should be affected: > - SUSE:SLE-12-SP1:Update > - SUSE:SLE-12-SP3:Update:Products:Cloud8:Update > - SUSE:SLE-12-SP4:Update:Products:Cloud9:Update > - SUSE:SLE-15:Update > - SUSE:SLE-15-SP1:Update > - SUSE:SLE-15-SP2:Update > > SUSE:SLE-11-SP1:Update:Teradata/python27-PyJWT is not affected Are you certain about it, I have here as supported only these channels: SLE-12-SP1:Update SLE-15-SP1:Update SLE-15-SP2:Update (In reply to Matej Cepl from comment #2) > Are you certain about it, I have here as supported only these channels: > > SLE-12-SP1:Update > SLE-15-SP1:Update > SLE-15-SP2:Update On smelt.suse.de/maintained/, SUSE:SLE-15:Update is indeed disabled, maybe because its only channel is EOL. So we don't need a submission for this codestream. However, SUSE:SLE-12-SP3:Update:Products:Cloud8:Update and SUSE:SLE-12-SP4:Update:Products:Cloud9:Update are enabled, but since this is for Cloud products, I don't know if it's maintainer's job to submit to those 2 codestreams... SUSE-SU-2022:2403-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1199756 CVE References: CVE-2022-29217 JIRA References: Sources used: SUSE Linux Enterprise Server for SAP 15-SP1 (src): python-PyJWT-1.7.1-150100.6.7.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): python-PyJWT-1.7.1-150100.6.7.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): python-PyJWT-1.7.1-150100.6.7.1 SUSE Linux Enterprise Module for Public Cloud 15-SP2 (src): python-PyJWT-1.7.1-150100.6.7.1 SUSE Linux Enterprise Module for Public Cloud 15-SP1 (src): python-PyJWT-1.7.1-150100.6.7.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): python-PyJWT-1.7.1-150100.6.7.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): python-PyJWT-1.7.1-150100.6.7.1 SUSE Enterprise Storage 6 (src): python-PyJWT-1.7.1-150100.6.7.1 SUSE CaaS Platform 4.0 (src): python-PyJWT-1.7.1-150100.6.7.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2022:2402-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1199756 CVE References: CVE-2022-29217 JIRA References: Sources used: openSUSE Leap 15.4 (src): python-PyJWT-1.7.1-150200.3.3.1 openSUSE Leap 15.3 (src): python-PyJWT-1.7.1-150200.3.3.1 SUSE Manager Server 4.1 (src): python-PyJWT-1.7.1-150200.3.3.1 SUSE Manager Retail Branch Server 4.1 (src): python-PyJWT-1.7.1-150200.3.3.1 SUSE Manager Proxy 4.1 (src): python-PyJWT-1.7.1-150200.3.3.1 SUSE Linux Enterprise Server for SAP 15-SP2 (src): python-PyJWT-1.7.1-150200.3.3.1 SUSE Linux Enterprise Server 15-SP2-LTSS (src): python-PyJWT-1.7.1-150200.3.3.1 SUSE Linux Enterprise Server 15-SP2-BCL (src): python-PyJWT-1.7.1-150200.3.3.1 SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (src): python-PyJWT-1.7.1-150200.3.3.1 SUSE Linux Enterprise Module for Basesystem 15-SP4 (src): python-PyJWT-1.7.1-150200.3.3.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): python-PyJWT-1.7.1-150200.3.3.1 SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): python-PyJWT-1.7.1-150200.3.3.1 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src): python-PyJWT-1.7.1-150200.3.3.1 SUSE Enterprise Storage 7 (src): python-PyJWT-1.7.1-150200.3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2022:2401-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1199756 CVE References: CVE-2022-29217 JIRA References: Sources used: SUSE Linux Enterprise Module for Public Cloud 12 (src): python-PyJWT-1.5.3-3.16.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. Matej, could you please also submit to SUSE:SLE-12-SP3:Update:Products:Cloud8:Update and SUSE:SLE-12-SP4:Update:Products:Cloud9:Update ? :) (In reply to Thomas Leroy from comment #9) > Matej, could you please also submit to > SUSE:SLE-12-SP3:Update:Products:Cloud8:Update and > SUSE:SLE-12-SP4:Update:Products:Cloud9:Update ? :) For both of these I suggest WONTFIX (the patch requires python-cryptography >= 2.6 and porting the patch to older version of cryptography would be quite complicated). SUSE-SU-2022:3545-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1199756 CVE References: CVE-2022-29217 JIRA References: Sources used: SUSE Linux Enterprise Module for Public Cloud 15 (src): python-PyJWT-1.5.3-150000.3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:0794-1: An update that solves one vulnerability, contains four features and has two fixes can now be installed. Category: security (critical) Bug References: 1176785, 1199282, 1199756 CVE References: CVE-2022-29217 Jira References: ECO-3105, PM-2352, PM-3243, SLE-24629 Sources used: openSUSE Leap 15.4 (src): python-PyJWT-2.4.0-150200.3.6.2 Basesystem Module 15-SP4 (src): python-PyJWT-2.4.0-150200.3.6.2 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): python-PyJWT-2.4.0-150200.3.6.2 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): python-PyJWT-2.4.0-150200.3.6.2 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): python-PyJWT-2.4.0-150200.3.6.2 SUSE Linux Enterprise Real Time 15 SP3 (src): python-PyJWT-2.4.0-150200.3.6.2 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): python-PyJWT-2.4.0-150200.3.6.2 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): python-PyJWT-2.4.0-150200.3.6.2 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): python-PyJWT-2.4.0-150200.3.6.2 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): python-PyJWT-2.4.0-150200.3.6.2 SUSE Manager Proxy 4.2 (src): python-PyJWT-2.4.0-150200.3.6.2 SUSE Manager Retail Branch Server 4.2 (src): python-PyJWT-2.4.0-150200.3.6.2 SUSE Manager Server 4.2 (src): python-PyJWT-2.4.0-150200.3.6.2 SUSE Enterprise Storage 7.1 (src): python-PyJWT-2.4.0-150200.3.6.2 SUSE Enterprise Storage 7 (src): python-PyJWT-2.4.0-150200.3.6.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. |