All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)((.*)). Note: This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.0.6-2ubuntu0.16.04.1~esm1", "binary_name": "python-configobj" }, { "binary_version": "5.0.6-2ubuntu0.16.04.1~esm1", "binary_name": "python-configobj-doc" }, { "binary_version": "5.0.6-2ubuntu0.16.04.1~esm1", "binary_name": "python3-configobj" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "5.0.6-2ubuntu0.18.04.1~esm1", "binary_name": "python-configobj" }, { "binary_version": "5.0.6-2ubuntu0.18.04.1~esm1", "binary_name": "python-configobj-doc" }, { "binary_version": "5.0.6-2ubuntu0.18.04.1~esm1", "binary_name": "python3-configobj" } ] }