An inefficient regular expression could be exploited to cause a Denial of Service condition.
Package | dev-python/jinja on all architectures |
---|---|
Affected versions | < 2.11.3 |
Unaffected versions | >= 2.11.3 |
Jinja is a template engine written in pure Python.
The ‘urlize’ filter in Jinja utilized an inefficient regular expression that could be exploited to consume excess CPU.
An attacker could cause a Denial of Service condition via crafted input to the ‘urlize’ Jinja filter.
There is no known workaround at this time.
All Jinja users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-python/jinja-2.11.3"
Release date
July 08, 2021
Latest revision
July 08, 2021: 1
Severity
low
Exploitable
remote
Bugzilla entries