An inefficient regular expression could be exploited to cause a Denial of Service condition.
|Package||dev-python/jinja on all architectures|
|Affected versions||< 2.11.3|
|Unaffected versions||>= 2.11.3|
Jinja is a template engine written in pure Python.
The ‘urlize’ filter in Jinja utilized an inefficient regular expression that could be exploited to consume excess CPU.
An attacker could cause a Denial of Service condition via crafted input to the ‘urlize’ Jinja filter.
There is no known workaround at this time.
All Jinja users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-python/jinja-2.11.3"
July 08, 2021
July 08, 2021: 1