Bug 1214685 (CVE-2022-48565) - VUL-0: CVE-2022-48565: python3,python,python3: Avoid plistlib XML vulnerabilities by rejecting entity directives
Summary: VUL-0: CVE-2022-48565: python3,python,python3: Avoid plistlib XML vulnerabili...
Status: IN_PROGRESS
Alias: CVE-2022-48565
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/376069/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-48565:5.3:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-08-28 11:17 UTC by Cathy Hu
Modified: 2024-03-09 10:10 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Cathy Hu 2023-08-28 11:17:24 UTC
CVE-2022-48565

An XML External Entity (XXE) issue was discovered in Python through 3.9.1. The
plistlib module no longer accepts entity declarations in XML plist files to
avoid XML vulnerabilities.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48565
https://www.cve.org/CVERecord?id=CVE-2022-48565
https://bugs.python.org/issue42051
Comment 1 Cathy Hu 2023-08-28 11:17:46 UTC
Affected:
- SUSE:SLE-11-SP1:Update/python                                       2.6.9
- SUSE:SLE-11-SP1:Update/python-base                                  2.6.9

- SUSE:SLE-12-SP1:Update/python                                       2.7.18
- SUSE:SLE-12-SP1:Update/python-base                                  2.7.18
- SUSE:SLE-12-SP4:Update/python                                       2.7.18
- SUSE:SLE-12-SP4:Update/python-base                                  2.7.18
- SUSE:SLE-15:Update/python                                           2.7.18
- SUSE:SLE-15:Update/python-base                                      2.7.18
- openSUSE:Factory/python                                             2.7.18

- SUSE:SLE-12:Update/python3                                          3.4.10

Not affected:
- SUSE:SLE-12-SP3:Update:Products:Teradata:Update/python36  3.6.15
- SUSE:SLE-12-SP5:Update/python36                           3.6.15

- SUSE:SLE-15-SP3:Update/python39                           3.9.17
- openSUSE:Factory/python39                                 3.9.17

- SUSE:ALP:Source:Standard:1.0/python310                    3.10.10
- SUSE:SLE-15-SP4:Update/python310                          3.10.12
- openSUSE:Factory/python310                                3.10.12

- SUSE:ALP:Source:Standard:1.0/python311                    3.11.2
- SUSE:SLE-15-SP4:Update/python311                          3.11.4
- openSUSE:Factory/python311                                3.11.4
Comment 2 Matej Cepl 2023-09-09 15:14:40 UTC
> - SUSE:SLE-11-SP1:Update/python                                       2.6.9
> - SUSE:SLE-11-SP1:Update/python-base                                  2.6.9

Shouldn’t these be truly wholly completely dead?
https://smelt.suse.de/maintained/?q=python
Comment 3 Cathy Hu 2023-09-11 08:35:27 UTC
yes you are right, sorry, they dont need a submission 
- SUSE:SLE-11-SP1:Update/python                                       2.6.9
- SUSE:SLE-11-SP1:Update/python-base                                  2.6.9
Comment 4 OBSbugzilla Bot 2023-09-16 23:05:05 UTC
This is an autogenerated message for OBS integration:
This bug (1214685) was mentioned in
https://build.opensuse.org/request/show/1111680 Factory / python
Comment 6 Matej Cepl 2023-09-30 16:44:45 UTC
Remaining SRs submitted.
Comment 8 Maintenance Automation 2023-10-06 16:29:05 UTC
SUSE-SU-2023:4001-1: An update that solves two vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1214685, 1214691
CVE References: CVE-2022-48565, CVE-2022-48566
Sources used:
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): python-base-2.7.18-33.26.1, python-doc-2.7.18-33.26.1, python-2.7.18-33.26.1
SUSE Linux Enterprise Server 12 SP5 (src): python-base-2.7.18-33.26.1, python-doc-2.7.18-33.26.1, python-2.7.18-33.26.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): python-base-2.7.18-33.26.1, python-doc-2.7.18-33.26.1, python-2.7.18-33.26.1
SUSE Linux Enterprise Workstation Extension 12 12-SP5 (src): python-base-2.7.18-33.26.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Maintenance Automation 2023-10-26 16:30:08 UTC
SUSE-SU-2023:4220-1: An update that solves three vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1210638, 1214685, 1214691
CVE References: CVE-2022-48565, CVE-2022-48566, CVE-2023-27043
Sources used:
openSUSE Leap 15.4 (src): python-base-2.7.18-150000.57.1, python-2.7.18-150000.57.1, python-doc-2.7.18-150000.57.1
openSUSE Leap 15.5 (src): python-base-2.7.18-150000.57.1, python-2.7.18-150000.57.1, python-doc-2.7.18-150000.57.1
SUSE Package Hub 15 15-SP4 (src): python-base-2.7.18-150000.57.1
SUSE Package Hub 15 15-SP5 (src): python-base-2.7.18-150000.57.1, python-2.7.18-150000.57.1
SUSE Manager Proxy 4.2 (src): python-base-2.7.18-150000.57.1, python-2.7.18-150000.57.1
SUSE Manager Retail Branch Server 4.2 (src): python-base-2.7.18-150000.57.1, python-2.7.18-150000.57.1
SUSE Manager Server 4.2 (src): python-base-2.7.18-150000.57.1, python-2.7.18-150000.57.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.