CVE-2021-20270

Beschreibung:
An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the „exception“ keyword.

CWE: CWE-835

CVSS-Bewertung
CVSS 2: MEDIUM – 5 (Version: 2.0)
CVSS 3: HIGH – 7.5 (Version: 3.1)

Links:

NVD – CVE-2021-20270
CVE – CVE-2021-20270

Link (max. 20) Quelle Tags
https://bugzilla.redhat.com/show_bug.cgi?id=1922136 MISC Issue Tracking Patch Third Party Advisory
DSA-4889 DEBIAN Exploit Third Party Advisory Third Party Advisory
[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update MLIST Third Party Advisory
[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update MLIST Third Party Advisory
https://security.netapp.com/advisory/ntap-20210326-0006/ CONFIRM Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc MISC Third Party Advisory
[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST Mailing List Third Party Advisory
[oss-security] 20210327 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST Mailing List Third Party Advisory
[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST Mailing List Third Party Advisory
[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST Mailing List Third Party Advisory
GLSA-202103-03 GENTOO Third Party Advisory
https://www.tenable.com/security/tns-2021-06 CONFIRM Third Party Advisory
https://www.tenable.com/security/tns-2021-05 CONFIRM Third Party Advisory
FEDORA-2021-cbf14ab8f9 FEDORA Mailing List Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10356 CONFIRM Third Party Advisory
https://www.tenable.com/security/tns-2021-09 CONFIRM

Quelle: NVD – CVE-2021-20270
Datum Veröffentlichung: 2021-03-23T17:15Z, Datum letzte Änderung: 2021-05-06T23:15Z