[manjaro-security] [ASA-201803-6] python2-django: denial of service
Jelle van der Waa
jelle at archlinux.org
Tue Mar 6 21:34:09 CET 2018
Arch Linux Security Advisory ASA-201803-6
Date : 2018-03-06
CVE-ID : CVE-2018-7536 CVE-2018-7537
Package : python2-django
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-649
The package python2-django before version 1.11.11-1 is vulnerable to
denial of service.
Upgrade to 1.11.11-1.
# pacman -Syu "python2-django>=1.11.11-1"
The problems have been fixed upstream in version 1.11.11.
- CVE-2018-7536 (denial of service)
The django.utils.html.urlize() function was extremely slow to evaluate
certain inputs due to catastrophic backtracking vulnerabilities in two
regular expressions. The urlize() function is used to implement the
urlize and urlizetrunc template filters, which were thus vulnerable.
The problematic regular expressions are replaced with parsing logic
that behaves similarly.
- CVE-2018-7537 (denial of service)
If django.utils.text.Truncator’s chars() and words() methods were
passed the html=True argument, they were extremely slow to evaluate
certain inputs due to a catastrophic backtracking vulnerability in a
regular expression. The chars() and words() methods are used to
implement the truncatechars_html and truncatewords_html template
filters, which were thus vulnerable.
A remote attacker is able to crash the application by providing
specially crafted input.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 488 bytes
Desc: not available
More information about the manjaro-security