Jinja: Denial of service — GLSA 202107-19

An inefficient regular expression could be exploited to cause a Denial of Service condition.

Affected packages

dev-python/jinja on all architectures
Affected versions < 2.11.3
Unaffected versions >= 2.11.3

Background

Jinja is a template engine written in pure Python.

Description

The ‘urlize’ filter in Jinja utilized an inefficient regular expression that could be exploited to consume excess CPU.

Impact

An attacker could cause a Denial of Service condition via crafted input to the ‘urlize’ Jinja filter.

Workaround

There is no known workaround at this time.

Resolution

All Jinja users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-python/jinja-2.11.3"
 

References

Release date
July 08, 2021

Latest revision
July 08, 2021: 1

Severity
low

Exploitable
remote

Bugzilla entries