From 58f17582085ba213528fc31f40d23c45239ce85de93728b07a7d14f4b40c7f2d Mon Sep 17 00:00:00 2001 From: Matej Cepl Date: Sat, 16 Sep 2023 21:37:01 +0000 Subject: [PATCH] There is no InvalidFileException OBS-URL: https://build.opensuse.org/package/show/devel:languages:python:Factory/python?expand=0&rev=388 --- CVE-2022-48565-plistlib-XML-vulns.patch | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/CVE-2022-48565-plistlib-XML-vulns.patch b/CVE-2022-48565-plistlib-XML-vulns.patch index 94a4dd8..a23e66a 100644 --- a/CVE-2022-48565-plistlib-XML-vulns.patch +++ b/CVE-2022-48565-plistlib-XML-vulns.patch @@ -31,7 +31,7 @@ Co-authored-by: Ned Deily + # vulnerabilies in expat. Regular plist files don't contain + # those declerations, and Apple's plutil tool does not accept + # them either. -+ raise InvalidFileException( ++ raise ValueError( + "XML entity declarations are not supported in plist files") + def handleBeginElement(self, element, attrs): @@ -64,7 +64,7 @@ Co-authored-by: Ned Deily self.assertEqual(test2, result2) + def test_xml_plist_with_entity_decl(self): -+ with self.assertRaisesRegexp(plistlib.InvalidFileException, ++ with self.assertRaisesRegexp(ValueError, + "XML entity declarations are not supported"): + plistlib.readPlistFromString(XML_PLIST_WITH_ENTITY) +