CVE-2022-40023: Sqlalchemy mako before 1.2.2 is vulnerable to Regular expression Denial of Service when using the Lexer class to parse. This also affects babelplugin and linguaplugin. Patch: https://github.com/sqlalchemy/mako/commit/925760291d6efec64fda6e9dd1fd9cfbd5be068c Please stabilize 1.2.2.
Thanks!
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=6c976cc7ae26b4f3d45ef9656880214e8894da5e commit 6c976cc7ae26b4f3d45ef9656880214e8894da5e Author: Michał Górny <mgorny@gentoo.org> AuthorDate: 2022-09-08 05:41:48 +0000 Commit: Michał Górny <mgorny@gentoo.org> CommitDate: 2022-09-08 05:42:13 +0000 dev-python/mako: Remove old Bug: https://bugs.gentoo.org/869095 Signed-off-by: Michał Górny <mgorny@gentoo.org> dev-python/mako/Manifest | 1 - dev-python/mako/mako-1.2.1.ebuild | 58 --------------------------------------- 2 files changed, 59 deletions(-)
Seems only exploitable in niche cases and even then only DoS, no glsa. All done!