- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202107-19
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Low
Title: Jinja: Denial of service
Date: July 08, 2021
Bugs: #768300
ID: 202107-19
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
An inefficient regular expression could be exploited to cause a Denial
of Service condition.
Background
==========
Jinja is a template engine written in pure Python.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-python/jinja < 2.11.3 >= 2.11.3
Description
===========
The 'urlize' filter in Jinja utilized an inefficient regular expression
that could be exploited to consume excess CPU.
Impact
======
An attacker could cause a Denial of Service condition via crafted input
to the 'urlize' Jinja filter.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Jinja users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-python/jinja-2.11.3"
References
==========
[ 1 ] CVE-2020-28493
https://nvd.nist.gov/vuln/detail/CVE-2020-28493
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202107-19
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2021 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
-----BEGIN PGP SIGNATURE-----
iQIzBAABCAAdFiEElFuPenBj6NvNLoABXP0dAeB+IzgFAmDmehUACgkQXP0dAeB+ IzgRIw/+NIw5tU3oQRSA5w7USGXl7u530dwUa5SFMW9cF5R3++DETFzdP9r7NND8 yBRcJjKCfsBYJ9vaZnkLHu83v2+A1znWyeXgUqX1AAUoZA1CQ4CDCYI13ds6idjP krqgCrhT7rY4KoeaIhBxl5XlEedXCCdXDKi+bvIT+p/O2ctkMRgNSbtP7tFFx43H r1zMnzRDgNb/2rViU9YWvf1tOm6MEZg5yLT1cv4XU8X4qSI+mkfNcmxjUlXbGqqA E+306ILXAjnEt34bhP9YUQgBy5jte0iaSd7pKcTLvAzZMbJ1y950a+1pOVkrlcpO AQAK/7yBqaXVcMtQy5xU/uXBMxA5pqH6aUc93dbfydezO7i4+U7KNFxtTDJK5bOu kB3AgIaABpLy8jrLkq16b5Uept0Lpg1O1AgKN74p3oD3Cv8Ww7FRU4AryvsgzF0Y fCdOFgduPWOeBL91nR7OLXVWvNBS3Wl0yVrCMhsDSnx1yBwkxOw4G41wWXLxZfy5 smZZ6XqhUpwUXbuKdWbFLk69K/7vgFctPV4P6dgJ7X27KmaKpW4KIbUK5qvolVAJ m+uJHZy07b5wiOrmY988NH6eZwFTd6vEX9hHtL+jaP0G9HVf/SU1dpc1SOpCeK1W l7QhQjyyXXsXBwP0j3qEkFcthXUlxpnoMrqUUdUdje5Nd86DcIY=
=LW1X
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)