Description: "This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDOS vulnerability of the regex is mainly due to the sub-pattern [a-zA-Z0-9._-]+.[a-zA-Z0-9._-]+ This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory." https://github.com/pallets/jinja/pull/1343
amd64 arm arm64 hppa ppc ppc64 s390 sparc x86 (ALLARCHES) done all arches done
Please cleanup, thanks!
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=eb398df7b14466404f4c768e7527c7f5dcb053c9 commit eb398df7b14466404f4c768e7527c7f5dcb053c9 Author: Michał Górny <mgorny@gentoo.org> AuthorDate: 2021-02-03 01:00:09 +0000 Commit: Michał Górny <mgorny@gentoo.org> CommitDate: 2021-02-03 01:00:15 +0000 dev-python/jinja: Remove old Bug: https://bugs.gentoo.org/768300 Signed-off-by: Michał Górny <mgorny@gentoo.org> dev-python/jinja/Manifest | 1 - dev-python/jinja/jinja-2.11.2-r1.ebuild | 68 --------------------------------- 2 files changed, 69 deletions(-)
New GLSA request filed.
This issue was resolved and addressed in GLSA 202107-19 at https://security.gentoo.org/glsa/202107-19 by GLSA coordinator John Helmert III (ajak).