Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2021-32839

Published: 20 September 2021

sqlparse is a non-validating SQL parser module for Python. In sqlparse versions 0.4.0 and 0.4.1 there is a regular Expression Denial of Service in sqlparse vulnerability. The regular expression may cause exponential backtracking on strings containing many repetitions of '\r\n' in SQL comments. Only the formatting feature that removes comments from SQL statements is affected by this regular expression. As a workaround don't use the sqlformat.format function with keyword strip_comments=True or the --strip-comments command line flag when using the sqlformat command line tool. The issues has been fixed in sqlparse 0.4.2.

Notes

AuthorNote
mdeslaur
introduced in 0.4.0 by:
https://github.com/andialbrecht/sqlparse/commit/1499cffcd7c4d635b4297b44d48fb4fe94cf988e

Priority

Medium

Cvss 3 Severity Score

7.5

Score breakdown

Status

Package Release Status
sqlparse
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(0.2.4-0.1)
focal Not vulnerable
(0.2.4-3)
hirsute
Released (0.4.1-1ubuntu0.1)
impish
Released (0.4.1-1ubuntu1)
jammy
Released (0.4.1-1ubuntu1)
trusty Does not exist

upstream
Released (0.4.2)
xenial Not vulnerable

Patches:
upstream: https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb

Severity score breakdown

Parameter Value
Base score 7.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H