Bug 2158559 (CVE-2022-40897)
Summary: | CVE-2022-40897 pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Chess Hazlett <chazlett> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | bbuckingham, bcoca, bcourt, bdettelb, btotty, cstratak, davidn, dfreiber, eglynn, ehelms, epacific, gtanzill, hhorak, jb2592, jburrell, jcammara, jhardy, jjoyce, jneedle, jobarker, jorton, jsherril, lhh, lmadsen, lzap, mabashia, mburns, mgarciac, mhulan, mminar, mrunge, myarboro, nboldt, nmoumoul, orabin, osapryki, pcreech, python-maint, rbiba, rchan, rogbas, rpalathi, saroy, scorneli, security-response-team, simaishi, smcdonal, spower, sskracic, teagle, vkumar, yguenane, zsadeh |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in Python Setuptools due to a regular expression Denial of Service (ReDoS) present in package_index.py. This issue could allow a remote attacker to cause a denial of service via HTML in a crafted package or custom PackageIndex page.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-02-28 12:16:10 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2158677, 2158679, 2158680, 2158681, 2158682, 2158683, 2159296, 2159297, 2159298, 2188149 | ||
Bug Blocks: | 2158555 |
Description
Chess Hazlett
2023-01-05 18:14:45 UTC
Created python-setuptools tracking bugs for this issue: Affects: fedora-all [bug 2158677] This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0835 https://access.redhat.com/errata/RHSA-2023:0835 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:0952 https://access.redhat.com/errata/RHSA-2023:0952 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-40897 This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2023:6793 https://access.redhat.com/errata/RHSA-2023:6793 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:7395 https://access.redhat.com/errata/RHSA-2023:7395 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:2985 https://access.redhat.com/errata/RHSA-2024:2985 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:2987 https://access.redhat.com/errata/RHSA-2024:2987 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:4421 https://access.redhat.com/errata/RHSA-2024:4421 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2024:6915 https://access.redhat.com/errata/RHSA-2024:6915 |