Bug#992590: jsoup: CVE-2021-37714

Salvatore Bonaccorso carnil at debian.org
Fri Aug 20 16:32:18 BST 2021


Source: jsoup
Version: 1.10.2-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>

Hi,

The following vulnerability was published for jsoup.

CVE-2021-37714[0]:
| jsoup is a Java library for working with HTML. Those using jsoup
| versions prior to 1.14.2 to parse untrusted HTML or XML may be
| vulnerable to DOS attacks. If the parser is run on user supplied
| input, an attacker may supply content that causes the parser to get
| stuck (loop indefinitely until cancelled), to complete more slowly
| than usual, or to throw an unexpected exception. This effect may
| support a denial of service attack. The issue is patched in version
| 1.14.2. There are a few available workarounds. Users may rate limit
| input parsing, limit the size of inputs based on system resources,
| and/or implement thread watchdogs to cap and timeout parse runtimes.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-37714
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37714
[1] https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



More information about the pkg-java-maintainers mailing list