Am Sat, Mar 06, 2021 at 09:39:52PM +0100 schrieb Salvatore Bonaccorso:
> Source: python-markdown2
> Version: 2.3.10-1
> Severity: important
> Tags: security upstream
> Forwarded: https://github.com/trentm/python-markdown2/pull/387
> X-Debbugs-Cc: car...@debian.org, Debian Security Team 
> <t...@security.debian.org>
> 
> Hi,
> 
> The following vulnerability was published for python-markdown2.
> 
> CVE-2021-26813[0]:
> | markdown2 &gt;=1.0.1.18, fixed in 2.4.0, is affected by a regular
> | expression denial of service vulnerability. If an attacker provides a
> | malicious string, it can make markdown2 processing difficult or
> | delayed for an extended period of time.
> 
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2021-26813
>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26813

This is fixed in
https://github.com/trentm/python-markdown2/commit/7b651260739647de5198323e0445b1618750c374
 ,
can we get that fixed/unblocked for Bullseye?

Cheers,
        Moritz

Reply via email to