Bugzilla – Bug 1203246
VUL-0: CVE-2022-40023: python-Mako: Regular expression Denial of Service when using the Lexer class to parse
Last modified: 2022-11-15 14:34:58 UTC
CVE-2022-40023 Sqlalchemy mako before 1.2.2 is vulnerable to Regular expression Denial of Service when using the Lexer class to parse. This also affects babelplugin and linguaplugin. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40023 https://github.com/sqlalchemy/mako/issues/366 https://github.com/sqlalchemy/mako/blob/c2f392e0be52dc67d1b9770ab8cce6a9c736d547/mako/ext/extract.py#L21 https://github.com/sqlalchemy/mako/commit/925760291d6efec64fda6e9dd1fd9cfbd5be068c https://www.cve.org/CVERecord?id=CVE-2022-40023 http://www.cvedetails.com/cve/CVE-2022-40023/ https://pyup.io/vulnerabilities/CVE-2022-40023/50870/
Affected: - SUSE:SLE-12-SP3:Update:Products:Cloud8:Update - SUSE:SLE-12-SP4:Update:Products:Cloud9:Update - SUSE:SLE-15:Update Since CVSS < 7.0, I guess that cloud-bugs has nothing to do.
I've added python-Mako package with sle-12-sp2 - taken from (Tumbleweed/Factory) - since our Mesa update required it for building. ------------------------------------------------------------------- Wed Feb 10 15:23:54 UTC 2016 - sndirsch@suse.com - needed for building current Mesa on sle12 (fate #315643-315645, 319159-319161, 319618) This is the only changelog entry from me, which didn't change later either. Seems for that reason the X.Org developers became the maintainer for SLE12 and later. I'm wondering if it would be possible to reassign maintainership to python-maintainers group. I would like to avoid a person working on security update for a package, who knows just nothing about it.
@Matej @Steve Could you please comment? Thanks! :-)
*** Bug 1204181 has been marked as a duplicate of this bug. ***
SUSE-SU-2022:3701-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1203246 CVE References: CVE-2022-40023 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 8 (src): python-Mako-1.0.7-3.3.1 SUSE OpenStack Cloud 8 (src): python-Mako-1.0.7-3.3.1 HPE Helion Openstack 8 (src): python-Mako-1.0.7-3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:3700-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1203246 CVE References: CVE-2022-40023 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): python-Mako-1.0.7-4.3.1 SUSE OpenStack Cloud 9 (src): python-Mako-1.0.7-4.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:3979-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1203246 CVE References: CVE-2022-40023 JIRA References: Sources used: openSUSE Leap 15.4 (src): python-Mako-1.0.7-150000.3.3.1 openSUSE Leap 15.3 (src): python-Mako-1.0.7-150000.3.3.1 SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4 (src): python-Mako-1.0.7-150000.3.3.1 SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (src): python-Mako-1.0.7-150000.3.3.1 SUSE Linux Enterprise Module for Basesystem 15-SP4 (src): python-Mako-1.0.7-150000.3.3.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): python-Mako-1.0.7-150000.3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.