Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-21503

Опубликовано: 19 мар. 2024
Источник: debian
EPSS Низкий

Описание

Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
blackfixed24.4.0-1package
blackignoredbookwormpackage
blackno-dsabullseyepackage
blackpostponedbusterpackage

Примечания

  • https://security.snyk.io/vuln/SNYK-PYTHON-BLACK-6256273

  • https://github.com/psf/black/releases/tag/24.3.0

  • https://github.com/psf/black/commit/f00093672628d212b8965a8993cee8bedf5fe9b8 (24.3.0)

EPSS

Процентиль: 19%
0.0006
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 2 года назад

Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings.

CVSS3: 5.3
redhat
почти 2 года назад

Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings.

CVSS3: 5.3
nvd
почти 2 года назад

Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings.

suse-cvrf
больше 1 года назад

Security update for python-black

CVSS3: 5.3
github
почти 2 года назад

Black vulnerable to Regular Expression Denial of Service (ReDoS)

EPSS

Процентиль: 19%
0.0006
Низкий