Denial of Service in Jinja
ID: | 202107-19 |
Distribution: | Gentoo |
Plattformen: | Keine Angabe |
Datum: | Do, 8. Juli 2021, 22:45 |
Referenzen: | https://nvd.nist.gov/vuln/detail/CVE-2020-28493 |
Applikationen: | Jinja2 |
Originalnachricht |
|
--X/QiK/yjsTRe+VVq Content-Type: text/plain; charset=us-ascii Content-Disposition: inlin Content-Transfer-Encoding: quoted-printable - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202107-19 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Low Title: Jinja: Denial of service Date: July 08, 2021 Bugs: #768300 ID: 202107-19 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== An inefficient regular expression could be exploited to cause a Denial of Service condition. Background ========== Jinja is a template engine written in pure Python. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-python/jinja < 2.11.3 >= 2.11.3 Description =========== The 'urlize' filter in Jinja utilized an inefficient regular expression that could be exploited to consume excess CPU. Impact ====== An attacker could cause a Denial of Service condition via crafted input to the 'urlize' Jinja filter. Workaround ========== There is no known workaround at this time. Resolution ========== All Jinja users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-python/jinja-2.11.3" References ========== [ 1 ] CVE-2020-28493 https://nvd.nist.gov/vuln/detail/CVE-2020-28493 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202107-19 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2021 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 --X/QiK/yjsTRe+VVq Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEElFuPenBj6NvNLoABXP0dAeB+IzgFAmDmehUACgkQXP0dAeB+ IzgRIw/+NIw5tU3oQRSA5w7USGXl7u530dwUa5SFMW9cF5R3++DETFzdP9r7NND8 yBRcJjKCfsBYJ9vaZnkLHu83v2+A1znWyeXgUqX1AAUoZA1CQ4CDCYI13ds6idjP krqgCrhT7rY4KoeaIhBxl5XlEedXCCdXDKi+bvIT+p/O2ctkMRgNSbtP7tFFx43H r1zMnzRDgNb/2rViU9YWvf1tOm6MEZg5yLT1cv4XU8X4qSI+mkfNcmxjUlXbGqqA E+306ILXAjnEt34bhP9YUQgBy5jte0iaSd7pKcTLvAzZMbJ1y950a+1pOVkrlcpO AQAK/7yBqaXVcMtQy5xU/uXBMxA5pqH6aUc93dbfydezO7i4+U7KNFxtTDJK5bOu kB3AgIaABpLy8jrLkq16b5Uept0Lpg1O1AgKN74p3oD3Cv8Ww7FRU4AryvsgzF0Y fCdOFgduPWOeBL91nR7OLXVWvNBS3Wl0yVrCMhsDSnx1yBwkxOw4G41wWXLxZfy5 smZZ6XqhUpwUXbuKdWbFLk69K/7vgFctPV4P6dgJ7X27KmaKpW4KIbUK5qvolVAJ m+uJHZy07b5wiOrmY988NH6eZwFTd6vEX9hHtL+jaP0G9HVf/SU1dpc1SOpCeK1W l7QhQjyyXXsXBwP0j3qEkFcthXUlxpnoMrqUUdUdje5Nd86DcIY= =LW1X -----END PGP SIGNATURE----- --X/QiK/yjsTRe+VVq-- |