{"id":"MGASA-2021-0245","summary":"Updated python-pygments packages fix a security vulnerability","details":"In pygments 1.1+, fixed in 2.7.4, the lexers used to parse\nprogramming languages rely heavily on regular expressions. Some of the\nregular expressions have exponential or cubic worst-case complexity and \nare vulnerable to ReDoS. By crafting malicious input, an attacker can cause a \ndenial of service (CVE-2021-27291).\n","modified":"2026-01-31T10:49:18.145779Z","published":"2021-06-13T21:32:39Z","related":["CVE-2021-27291"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0245.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=28982"},{"type":"REPORT","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/GSJRFHALQ7E3UV4FFMFU2YQ6LUDHAI55/"}],"affected":[{"package":{"name":"python-pygments","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/python-pygments?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.3.1-1.2.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0245.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}