Source: knack
Version: 0.12.0-2
Severity: important
Tags: security upstream
Forwarded: https://github.com/microsoft/knack/issues/281
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerabilities were published for knack.

CVE-2025-54363[0]:
| Microsoft Knack 0.12.0 allows Regular expression Denial of Service
| (ReDoS) in the knack.introspection module.
| extract_full_summary_from_signature employs an inefficient regular
| expression pattern: "\s(:param)\s+(.+?)\s:(.*)" that is susceptible
| to catastrophic backtracking when processing crafted docstrings
| containing a large volume of whitespace without a terminating colon.
| An attacker who can control or inject docstring content into
| affected applications can trigger excessive CPU consumption. This
| software is used by Azure CLI.


CVE-2025-54364[1]:
| Microsoft Knack 0.12.0 allows Regular expression Denial of Service
| (ReDoS) in the knack.introspection module. option_descriptions
| employs an inefficient regular expression pattern:
| "\s(:param)\s+(.+?)\s:(.*)" that is susceptible to catastrophic
| backtracking when processing crafted docstrings containing a large
| volume of whitespace without a terminating colon. An attacker who
| can control or inject docstring content into affected applications
| can trigger excessive CPU consumption. This software is used by
| Azure CLI.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-54363
    https://www.cve.org/CVERecord?id=CVE-2025-54363
[1] https://security-tracker.debian.org/tracker/CVE-2025-54364
    https://www.cve.org/CVERecord?id=CVE-2025-54364
[2] https://github.com/microsoft/knack/issues/281

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to