CVE-2021-33503: An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect. Please stabilize.
amd64 arm arm64 hppa ppc ppc64 sparc x86 (ALLARCHES) done all arches done
GLSA request filed.
This issue was resolved and addressed in GLSA 202107-36 at https://security.gentoo.org/glsa/202107-36 by GLSA coordinator John Helmert III (ajak).
Reopening for cleanup
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=f47a46e8ba0bc6982eab353a5e69e8e143e7e2d7 commit f47a46e8ba0bc6982eab353a5e69e8e143e7e2d7 Author: Michał Górny <mgorny@gentoo.org> AuthorDate: 2021-07-15 17:04:21 +0000 Commit: Michał Górny <mgorny@gentoo.org> CommitDate: 2021-07-15 17:04:24 +0000 dev-python/urllib3: Remove old Bug: https://bugs.gentoo.org/799413 Signed-off-by: Michał Górny <mgorny@gentoo.org> dev-python/urllib3/Manifest | 1 - .../files/urllib3-1.26.4-test-ssltransport.patch | 31 ------- dev-python/urllib3/urllib3-1.26.4.ebuild | 97 ---------------------- 3 files changed, 129 deletions(-)
Thank you! All done.