Control: tags -1 -security
Control: tags -1 wontfix
Control: close -1

On Thu, 21 Aug 2025 21:48:51 +0200 Salvatore Bonaccorso
<[email protected]> wrote:
> Source: knack
> Version: 0.12.0-2
> Severity: important
> Tags: security upstream
> Forwarded: https://github.com/microsoft/knack/issues/281
> X-Debbugs-Cc: [email protected], Debian Security Team
<[email protected]>
> 
> Hi,
> 
> The following vulnerabilities were published for knack.
> 
> CVE-2025-54363[0]:
> | Microsoft Knack 0.12.0 allows Regular expression Denial of Service
> | (ReDoS) in the knack.introspection module.
> | extract_full_summary_from_signature employs an inefficient regular
> | expression pattern: "\s(:param)\s+(.+?)\s:(.*)" that is susceptible
> | to catastrophic backtracking when processing crafted docstrings
> | containing a large volume of whitespace without a terminating
colon.
> | An attacker who can control or inject docstring content into
> | affected applications can trigger excessive CPU consumption. This
> | software is used by Azure CLI.
> 
> 
> CVE-2025-54364[1]:
> | Microsoft Knack 0.12.0 allows Regular expression Denial of Service
> | (ReDoS) in the knack.introspection module. option_descriptions
> | employs an inefficient regular expression pattern:
> | "\s(:param)\s+(.+?)\s:(.*)" that is susceptible to catastrophic
> | backtracking when processing crafted docstrings containing a large
> | volume of whitespace without a terminating colon. An attacker who
> | can control or inject docstring content into affected applications
> | can trigger excessive CPU consumption. This software is used by
> | Azure CLI.
> 
> 
> If you fix the vulnerabilities please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2025-54363
>     https://www.cve.org/CVERecord?id=CVE-2025-54363
> [1] https://security-tracker.debian.org/tracker/CVE-2025-54364
>     https://www.cve.org/CVERecord?id=CVE-2025-54364
> [2] https://github.com/microsoft/knack/issues/281
> 
> Please adjust the affected versions in the BTS as needed.

Hi,

As per:

https://github.com/microsoft/knack/issues/281#issuecomment-3218922941

these CVEs have been withdrawn:

https://github.com/advisories/GHSA-6fxp-p9mg-q64w
https://github.com/advisories/GHSA-xh9h-692f-mmg4

as the affected code only affects some documentation parsing, so it's
not part of the threat model of the package. Closing accordingly.

Reply via email to