Upstream information

CVE-2022-2309 at MITRE

Description

NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide-spread use, given that parsing + iterwalk would usually be replaced with the more efficient iterparse function. However, an XML converter that serialises to C14N would also be vulnerable, for example, and there are legitimate use cases for this code sequence. If untrusted input is received (also remotely) and processed via iterwalk function, a crash can be triggered.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
CVSS v3 Scores
  National Vulnerability Database SUSE
Base Score 7.5 6.5
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Attack Vector Network Network
Attack Complexity Low Low
Privileges Required None None
User Interaction None Required
Scope Unchanged Unchanged
Confidentiality Impact None None
Integrity Impact None None
Availability Impact High High
CVSSv3 Version 3.1 3.1
SUSE Bugzilla entry: 1201253 [NEW]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Container ses/7.1/cephcsi/cephcsi:3.5.1.0.3.2.345
Container ses/7.1/rook/ceph:1.8.10.0.4.5.173
Image SLES15-SP2-BYOS-Azure
Image SLES15-SP2-BYOS-EC2-HVM
Image SLES15-SP2-BYOS-GCE
Image SLES15-SP2-HPC-BYOS-Azure
Image SLES15-SP2-HPC-BYOS-EC2-HVM
Image SLES15-SP2-SAP-Azure
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
Image SLES15-SP2-SAP-BYOS-Azure
Image SLES15-SP2-SAP-BYOS-EC2-HVM
Image SLES15-SP2-SAP-BYOS-GCE
Image SLES15-SP2-SAP-EC2-HVM
Image SLES15-SP2-SAP-GCE
Image SLES15-SP3-BYOS-Azure
Image SLES15-SP3-BYOS-EC2-HVM
Image SLES15-SP3-BYOS-GCE
Image SLES15-SP3-HPC-BYOS-Azure
Image SLES15-SP3-HPC-BYOS-EC2-HVM
Image SLES15-SP3-HPC-BYOS-GCE
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE
Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure
Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM
Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production
Image SLES15-SP3-SAP-BYOS-Azure
Image SLES15-SP3-SAP-BYOS-EC2-HVM
Image SLES15-SP3-SAP-BYOS-GCE
Image SLES15-SP3-SAPCAL-Azure
Image SLES15-SP3-SAPCAL-EC2-HVM
Image SLES15-SP3-SAPCAL-GCE
Image SLES15-SP4
Image SLES15-SP4-Azure-Basic
Image SLES15-SP4-Azure-Standard
Image SLES15-SP4-BYOS
Image SLES15-SP4-BYOS-Azure
Image SLES15-SP4-BYOS-EC2
Image SLES15-SP4-BYOS-GCE
Image SLES15-SP4-EC2
Image SLES15-SP4-EC2-ECS-HVM
Image SLES15-SP4-GCE
Image SLES15-SP4-HPC
Image SLES15-SP4-HPC-Azure
Image SLES15-SP4-HPC-BYOS
Image SLES15-SP4-HPC-BYOS-Azure
Image SLES15-SP4-HPC-BYOS-EC2
Image SLES15-SP4-HPC-BYOS-GCE
Image SLES15-SP4-HPC-EC2
Image SLES15-SP4-HPC-GCE
Image SLES15-SP4-Hardened-BYOS
Image SLES15-SP4-Hardened-BYOS-Azure
Image SLES15-SP4-Hardened-BYOS-EC2
Image SLES15-SP4-Hardened-BYOS-GCE
Image SLES15-SP4-Manager-Proxy-4-3-BYOS
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE
Image SLES15-SP4-Manager-Server-4-3-BYOS
Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure
Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2
Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE
Image SLES15-SP4-Micro-5-3-BYOS
Image SLES15-SP4-Micro-5-3-BYOS-Azure
Image SLES15-SP4-Micro-5-3-BYOS-EC2
Image SLES15-SP4-Micro-5-3-BYOS-GCE
Image SLES15-SP4-SAP
Image SLES15-SP4-SAP-Azure
Image SLES15-SP4-SAP-Azure-LI-BYOS
Image SLES15-SP4-SAP-Azure-LI-BYOS-Production
Image SLES15-SP4-SAP-Azure-VLI-BYOS
Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production
Image SLES15-SP4-SAP-BYOS
Image SLES15-SP4-SAP-BYOS-Azure
Image SLES15-SP4-SAP-BYOS-EC2
Image SLES15-SP4-SAP-BYOS-GCE
Image SLES15-SP4-SAP-EC2
Image SLES15-SP4-SAP-GCE
Image SLES15-SP4-SAP-Hardened-BYOS
Image SLES15-SP4-SAP-Hardened-BYOS-Azure
Image SLES15-SP4-SAP-Hardened-BYOS-EC2
Image SLES15-SP4-SAP-Hardened-BYOS-GCE
Image SLES15-SP4-SAPCAL
Image SLES15-SP4-SAPCAL-Azure
Image SLES15-SP4-SAPCAL-EC2
Image SLES15-SP4-SAPCAL-GCE
  • python3-lxml >= 4.7.1-150200.3.10.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production
Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production
Image SLES15-SP1-SAPCAL-Azure
Image SLES15-SP1-SAPCAL-EC2-HVM
Image SLES15-SP1-SAPCAL-GCE
  • python3-lxml >= 4.7.1-150100.6.6.1
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise Desktop 15 SP3
SUSE Linux Enterprise High Performance Computing 15 SP3
SUSE Linux Enterprise Server 15 SP3
SUSE Linux Enterprise Server for SAP Applications 15 SP3
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.2
SUSE Manager Server 4.2
  • python2-lxml >= 4.7.1-150200.3.10.1
  • python2-lxml-devel >= 4.7.1-150200.3.10.1
  • python3-lxml >= 4.7.1-150200.3.10.1
  • python3-lxml-devel >= 4.7.1-150200.3.10.1
Patchnames:
SUSE-SLE-Module-Basesystem-15-SP3-2022-2908
SUSE-SLE-Module-Python2-15-SP3-2022-2908
SUSE Enterprise Storage 7
  • python2-lxml >= 4.7.1-150200.3.10.1
  • python2-lxml-devel >= 4.7.1-150200.3.10.1
  • python3-lxml >= 4.7.1-150200.3.10.1
  • python3-lxml-devel >= 4.7.1-150200.3.10.1
Patchnames:
SUSE-Storage-7-2022-2908
SUSE Linux Enterprise Desktop 15 SP4
SUSE Linux Enterprise High Performance Computing 15 SP4
SUSE Linux Enterprise Module for Basesystem 15 SP4
SUSE Linux Enterprise Server 15 SP4
SUSE Linux Enterprise Server for SAP Applications 15 SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
  • python3-lxml >= 4.7.1-150200.3.10.1
  • python3-lxml-devel >= 4.7.1-150200.3.10.1
Patchnames:
SUSE-SLE-Module-Basesystem-15-SP4-2022-2908
SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS
  • python2-lxml >= 4.7.1-150200.3.10.1
  • python2-lxml-devel >= 4.7.1-150200.3.10.1
  • python3-lxml >= 4.7.1-150200.3.10.1
  • python3-lxml-devel >= 4.7.1-150200.3.10.1
Patchnames:
SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2908
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
  • python2-lxml >= 4.7.1-150200.3.10.1
  • python2-lxml-devel >= 4.7.1-150200.3.10.1
  • python3-lxml >= 4.7.1-150200.3.10.1
  • python3-lxml-devel >= 4.7.1-150200.3.10.1
Patchnames:
SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2908
SUSE Linux Enterprise High Performance Computing 15
SUSE Linux Enterprise Module for Public Cloud 15
SUSE Linux Enterprise Server 15
SUSE Linux Enterprise Server for SAP Applications 15
  • python3-lxml >= 4.7.1-150100.6.6.1
  • python3-lxml-devel >= 4.7.1-150100.6.6.1
  • python3-lxml-doc >= 4.7.1-150100.6.6.1
Patchnames:
SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-2878
SUSE Linux Enterprise Module for Basesystem 15 SP3
  • python3-lxml >= 4.7.1-150200.3.10.1
  • python3-lxml-devel >= 4.7.1-150200.3.10.1
Patchnames:
SUSE-SLE-Module-Basesystem-15-SP3-2022-2908
SUSE Linux Enterprise Module for Python 2 15 SP3
  • python2-lxml >= 4.7.1-150200.3.10.1
  • python2-lxml-devel >= 4.7.1-150200.3.10.1
Patchnames:
SUSE-SLE-Module-Python2-15-SP3-2022-2908
SUSE Linux Enterprise Server 15 SP2-BCL
  • python3-lxml >= 4.7.1-150200.3.10.1
  • python3-lxml-devel >= 4.7.1-150200.3.10.1
Patchnames:
SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2908
SUSE Linux Enterprise Server 15 SP2-LTSS
  • python2-lxml >= 4.7.1-150200.3.10.1
  • python2-lxml-devel >= 4.7.1-150200.3.10.1
  • python3-lxml >= 4.7.1-150200.3.10.1
  • python3-lxml-devel >= 4.7.1-150200.3.10.1
Patchnames:
SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2908
SUSE Linux Enterprise Server for SAP Applications 15 SP2
  • python2-lxml >= 4.7.1-150200.3.10.1
  • python2-lxml-devel >= 4.7.1-150200.3.10.1
  • python3-lxml >= 4.7.1-150200.3.10.1
  • python3-lxml-devel >= 4.7.1-150200.3.10.1
Patchnames:
SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2908
SUSE Manager Proxy 4.1
  • python2-lxml >= 4.7.1-150200.3.10.1
  • python2-lxml-devel >= 4.7.1-150200.3.10.1
  • python3-lxml >= 4.7.1-150200.3.10.1
  • python3-lxml-devel >= 4.7.1-150200.3.10.1
Patchnames:
SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2908
SUSE Manager Retail Branch Server 4.1
  • python2-lxml >= 4.7.1-150200.3.10.1
  • python2-lxml-devel >= 4.7.1-150200.3.10.1
  • python3-lxml >= 4.7.1-150200.3.10.1
  • python3-lxml-devel >= 4.7.1-150200.3.10.1
Patchnames:
SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2908
SUSE Manager Server 4.1
  • python2-lxml >= 4.7.1-150200.3.10.1
  • python2-lxml-devel >= 4.7.1-150200.3.10.1
  • python3-lxml >= 4.7.1-150200.3.10.1
  • python3-lxml-devel >= 4.7.1-150200.3.10.1
Patchnames:
SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2908
openSUSE Leap 15.3
  • python2-lxml >= 4.7.1-150200.3.10.1
  • python2-lxml-devel >= 4.7.1-150200.3.10.1
  • python3-lxml >= 4.7.1-150200.3.10.1
  • python3-lxml-devel >= 4.7.1-150200.3.10.1
Patchnames:
openSUSE-SLE-15.3-2022-2908
openSUSE Leap 15.4
  • python3-lxml >= 4.7.1-150200.3.10.1
  • python3-lxml-devel >= 4.7.1-150200.3.10.1
  • python3-lxml-doc >= 4.7.1-150200.3.10.1
Patchnames:
openSUSE-SLE-15.4-2022-2908
openSUSE Tumbleweed
  • libxml2-2 >= 2.10.1-1.1
  • libxml2-2-32bit >= 2.10.1-1.1
  • libxml2-devel >= 2.10.1-1.1
  • libxml2-devel-32bit >= 2.10.1-1.1
  • libxml2-doc >= 2.10.1-1.1
  • libxml2-tools >= 2.10.1-1.1
  • python-lxml-doc >= 4.9.1-2.1
  • python310-lxml >= 4.9.1-2.1
  • python310-lxml-devel >= 4.9.1-2.1
  • python38-lxml >= 4.9.1-2.1
  • python38-lxml-devel >= 4.9.1-2.1
  • python39-lxml >= 4.9.1-2.1
  • python39-lxml-devel >= 4.9.1-2.1
Patchnames:
openSUSE Tumbleweed GA libxml2-2-2.10.1-1.1
openSUSE Tumbleweed GA python-lxml-doc-4.9.1-2.1


First public cloud image revisions this CVE is fixed in:


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
HPE Helion OpenStack 8 python-lxml Not affected
HPE Helion OpenStack 8 python3-lxml Not affected
SUSE CaaS Platform 4.0 python-lxml Not affected
SUSE Enterprise Storage 6 python-lxml Not affected
SUSE Enterprise Storage 7 python-lxml Released
SUSE Enterprise Storage 7.1 python-lxml Released
SUSE Linux Enterprise Desktop 15 SP3 python-lxml Released
SUSE Linux Enterprise Desktop 15 SP4 python-lxml Released
SUSE Linux Enterprise High Performance Computing 12 SP5 python-lxml Not affected
SUSE Linux Enterprise High Performance Computing 12 SP5 python3-lxml Not affected
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS python-lxml Not affected
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS python-lxml Not affected
SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS python-lxml Released
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS python-lxml Released
SUSE Linux Enterprise High Performance Computing 15 SP3 python-lxml Released
SUSE Linux Enterprise High Performance Computing 15 SP4 python-lxml Released
SUSE Linux Enterprise High Performance Computing 15-LTSS python-lxml Not affected
SUSE Linux Enterprise Module for Basesystem 15 SP3 python-lxml Released
SUSE Linux Enterprise Module for Basesystem 15 SP4 python-lxml Released
SUSE Linux Enterprise Module for Python 2 15 SP3 python-lxml Released
SUSE Linux Enterprise Server 12 SP2-BCL python-lxml Not affected
SUSE Linux Enterprise Server 12 SP2-BCL python3-lxml Not affected
SUSE Linux Enterprise Server 12 SP3-BCL python-lxml Not affected
SUSE Linux Enterprise Server 12 SP3-BCL python3-lxml Not affected
SUSE Linux Enterprise Server 12 SP3-ESPOS python-lxml Not affected
SUSE Linux Enterprise Server 12 SP3-ESPOS python3-lxml Not affected
SUSE Linux Enterprise Server 12 SP3-LTSS python-lxml Not affected
SUSE Linux Enterprise Server 12 SP3-LTSS python3-lxml Not affected
SUSE Linux Enterprise Server 12 SP4-ESPOS python-lxml Not affected
SUSE Linux Enterprise Server 12 SP4-ESPOS python3-lxml Not affected
SUSE Linux Enterprise Server 12 SP4-LTSS python-lxml Not affected
SUSE Linux Enterprise Server 12 SP4-LTSS python3-lxml Not affected
SUSE Linux Enterprise Server 12 SP5 python-lxml Not affected
SUSE Linux Enterprise Server 12 SP5 python3-lxml Not affected
SUSE Linux Enterprise Server 15 SP1-LTSS python-lxml Not affected
SUSE Linux Enterprise Server 15 SP2-LTSS python-lxml Released
SUSE Linux Enterprise Server 15 SP3 python-lxml Released
SUSE Linux Enterprise Server 15 SP4 python-lxml Released
SUSE Linux Enterprise Server 15-ESPOS python-lxml Not affected
SUSE Linux Enterprise Server 15-LTSS python-lxml Not affected
SUSE Linux Enterprise Server Business Critical Linux 15 SP1 python-lxml Not affected
SUSE Linux Enterprise Server Business Critical Linux 15 SP2 python-lxml Released
SUSE Linux Enterprise Server for SAP Applications 12 SP3 python-lxml Not affected
SUSE Linux Enterprise Server for SAP Applications 12 SP3 python3-lxml Not affected
SUSE Linux Enterprise Server for SAP Applications 12 SP4 python-lxml Not affected
SUSE Linux Enterprise Server for SAP Applications 12 SP4 python3-lxml Not affected
SUSE Linux Enterprise Server for SAP Applications 12 SP5 python-lxml Not affected
SUSE Linux Enterprise Server for SAP Applications 12 SP5 python3-lxml Not affected
SUSE Linux Enterprise Server for SAP Applications 15 python-lxml Not affected
SUSE Linux Enterprise Server for SAP Applications 15 SP1 python-lxml Not affected
SUSE Linux Enterprise Server for SAP Applications 15 SP2 python-lxml Released
SUSE Linux Enterprise Server for SAP Applications 15 SP3 python-lxml Released
SUSE Linux Enterprise Server for SAP Applications 15 SP4 python-lxml Released
SUSE Manager Proxy 4.1 python-lxml Released
SUSE Manager Proxy 4.2 python-lxml Released
SUSE Manager Proxy 4.3 python-lxml Released
SUSE Manager Retail Branch Server 4.1 python-lxml Released
SUSE Manager Retail Branch Server 4.2 python-lxml Released
SUSE Manager Retail Branch Server 4.3 python-lxml Released
SUSE Manager Server 4.1 python-lxml Released
SUSE Manager Server 4.2 python-lxml Released
SUSE Manager Server 4.3 python-lxml Released
SUSE OpenStack Cloud 8 python-lxml Not affected
SUSE OpenStack Cloud 8 python3-lxml Not affected
SUSE OpenStack Cloud 9 python-lxml Not affected
SUSE OpenStack Cloud 9 python3-lxml Not affected
SUSE OpenStack Cloud Crowbar 8 python-lxml Not affected
SUSE OpenStack Cloud Crowbar 8 python3-lxml Not affected
SUSE OpenStack Cloud Crowbar 9 python-lxml Not affected
SUSE OpenStack Cloud Crowbar 9 python3-lxml Not affected


SUSE Timeline for this CVE

CVE page created: Tue Jul 5 18:10:20 2022
CVE page last modified: Fri Nov 25 17:51:48 2022