Resource Exhaustion Affecting babel package, versions <0:2.7.0-11.module+el8.5.0+672+ab6eb015


Severity

Recommended
medium

Based on Rocky Linux security rating.

Threat Intelligence

EPSS
0.44% (75th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Resource Exhaustion vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ROCKY8-BABEL-3221995
  • published5 Jan 2023
  • disclosed29 Jun 2021

Introduced: 29 Jun 2021

CVE-2021-33503  (opens in a new tab)
CWE-400  (opens in a new tab)

How to fix?

Upgrade Rocky-Linux:8 babel to version 0:2.7.0-11.module+el8.5.0+672+ab6eb015 or higher.
This issue was patched in RLSA-2021:4162.

NVD Description

Note: Versions mentioned in the description apply only to the upstream babel package and not the babel package as distributed by Rocky-Linux. See How to fix? for Rocky-Linux:8 relevant fixed versions and status.

An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.

CVSS Scores

version 3.1