• [gentoo-announce] [ GLSA 202107-19 ] Jinja: Denial of service

    From ajak@gentoo.org@21:1/5 to All on Thu Jul 8 06:20:01 2021
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202107-19
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: Low
    Title: Jinja: Denial of service
    Date: July 08, 2021
    Bugs: #768300
    ID: 202107-19

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    An inefficient regular expression could be exploited to cause a Denial
    of Service condition.

    Background
    ==========

    Jinja is a template engine written in pure Python.

    Affected packages
    =================

    -------------------------------------------------------------------
    Package / Vulnerable / Unaffected
    -------------------------------------------------------------------
    1 dev-python/jinja < 2.11.3 >= 2.11.3

    Description
    ===========

    The 'urlize' filter in Jinja utilized an inefficient regular expression
    that could be exploited to consume excess CPU.

    Impact
    ======

    An attacker could cause a Denial of Service condition via crafted input
    to the 'urlize' Jinja filter.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All Jinja users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=dev-python/jinja-2.11.3"

    References
    ==========

    [ 1 ] CVE-2020-28493
    https://nvd.nist.gov/vuln/detail/CVE-2020-28493

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202107-19

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2021 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5


    -----BEGIN PGP SIGNATURE-----

    iQIzBAABCAAdFiEElFuPenBj6NvNLoABXP0dAeB+IzgFAmDmehUACgkQXP0dAeB+ IzgRIw/+NIw5tU3oQRSA5w7USGXl7u530dwUa5SFMW9cF5R3++DETFzdP9r7NND8 yBRcJjKCfsBYJ9vaZnkLHu83v2+A1znWyeXgUqX1AAUoZA1CQ4CDCYI13ds6idjP krqgCrhT7rY4KoeaIhBxl5XlEedXCCdXDKi+bvIT+p/O2ctkMRgNSbtP7tFFx43H r1zMnzRDgNb/2rViU9YWvf1tOm6MEZg5yLT1cv4XU8X4qSI+mkfNcmxjUlXbGqqA E+306ILXAjnEt34bhP9YUQgBy5jte0iaSd7pKcTLvAzZMbJ1y950a+1pOVkrlcpO AQAK/7yBqaXVcMtQy5xU/uXBMxA5pqH6aUc93dbfydezO7i4+U7KNFxtTDJK5bOu kB3AgIaABpLy8jrLkq16b5Uept0Lpg1O1AgKN74p3oD3Cv8Ww7FRU4AryvsgzF0Y fCdOFgduPWOeBL91nR7OLXVWvNBS3Wl0yVrCMhsDSnx1yBwkxOw4G41wWXLxZfy5 smZZ6XqhUpwUXbuKdWbFLk69K/7vgFctPV4P6dgJ7X27KmaKpW4KIbUK5qvolVAJ m+uJHZy07b5wiOrmY988NH6eZwFTd6vEX9hHtL+jaP0G9HVf/SU1dpc1SOpCeK1W l7QhQjyyXXsXBwP0j3qEkFcthXUlxpnoMrqUUdUdje5Nd86DcIY=
    =LW1X
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)