All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)((.*)). Note: This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_name": "python-configobj", "binary_version": "5.0.6-2ubuntu0.16.04.1~esm1" }, { "binary_name": "python-configobj-doc", "binary_version": "5.0.6-2ubuntu0.16.04.1~esm1" }, { "binary_name": "python3-configobj", "binary_version": "5.0.6-2ubuntu0.16.04.1~esm1" } ], "ubuntu_priority": "low" }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_name": "python-configobj", "binary_version": "5.0.6-2ubuntu0.18.04.1~esm1" }, { "binary_name": "python-configobj-doc", "binary_version": "5.0.6-2ubuntu0.18.04.1~esm1" }, { "binary_name": "python3-configobj", "binary_version": "5.0.6-2ubuntu0.18.04.1~esm1" } ], "ubuntu_priority": "low" }