Upstream information

CVE-2021-32837 at MITRE

Description

mechanize, a library for automatically interacting with HTTP web servers, contains a regular expression that is vulnerable to regular expression denial of service (ReDoS) prior to version 0.4.6. If a web server responds in a malicious way, then mechanize could crash. Version 0.4.6 has a patch for the issue.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v3 Scores
  National Vulnerability Database
Base Score 7.5
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1207242 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 15 SP4
  • python3-mechanize >= 0.4.8-bp154.2.3.1
Patchnames:
openSUSE-2023-30
openSUSE Leap 15.4
  • python3-mechanize >= 0.4.8-bp154.2.3.1
Patchnames:
openSUSE-2023-30
openSUSE Tumbleweed
  • python310-mechanize >= 0.4.8-4.1
  • python38-mechanize >= 0.4.8-4.1
  • python39-mechanize >= 0.4.8-4.1
Patchnames:
openSUSE-Tumbleweed-2024-12621


SUSE Timeline for this CVE

CVE page created: Wed Jan 18 01:00:43 2023
CVE page last modified: Tue Sep 3 19:20:39 2024