Description
In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2600-1 | pygments security update |
Debian DLA |
DLA-2648-1 | mediawiki security update |
Debian DLA |
DLA-2648-2 | mediawiki regression update |
Debian DSA |
DSA-4878-1 | pygments security update |
Debian DSA |
DSA-4889-1 | mediawiki security update |
EUVD |
EUVD-2021-0208 | In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service. |
Github GHSA |
GHSA-pq64-v7f5-gqh8 | Pygments vulnerable to Regular Expression Denial of Service (ReDoS) |
Ubuntu USN |
USN-4897-1 | Pygments vulnerability |
Ubuntu USN |
USN-4897-2 | Pygments vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T20:48:16.368Z
Reserved: 2021-02-16T00:00:00.000Z
Link: CVE-2021-27291
No data.
Status : Modified
Published: 2021-03-17T13:15:15.137
Modified: 2024-11-21T05:57:45.667
Link: CVE-2021-27291
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN