prism is vulnerable to Inefficient Regular Expression Complexity. Reference: https://huntr.dev/bounties/8c16ab31-6eb6-46d1-b9a4-387222fe1b8a Upstream patch: https://github.com/prismjs/prism/commit/0ff371bb4775a131634f47d0fe85794c547232f9
This issue has been addressed in the following products: RHACS-3.67-RHEL-8 Via RHSA-2021:4902 https://access.redhat.com/errata/RHSA-2021:4902
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-3801