[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1872-1] python-django security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : python-django
Version        : 1.7.11-1+deb8u7
CVE IDs        : CVE-2019-14232 CVE-2019-14233
Debian Bug     : #934026

It was discovered that there were two vulnerabilities in the
Django web development framework:

  * CVE-2019-14232: Prevent a possible denial-of-service in
    django.utils.text.Truncator.

    If django.utils.text.Truncator's chars() and words() methods were
    passed the html=True argument, they were extremely slow to
    evaluate certain inputs due to a catastrophic backtracking
    vulnerability in a regular expression.  The chars() and words()
    methods are used to implement the truncatechars_html and
    truncatewords_html template filters, which were thus vulnerable.

    The regular expressions used by Truncator have been simplified in
    order to avoid potential backtracking issues. As a consequence,
    trailing punctuation may now at times be included in the
    truncated output.

  * CVE-2019-14233: Prevent a possible denial-of-service in strip_tags().

    Due to the behavior of the underlying HTMLParser,
    django.utils.html.strip_tags() would be extremely slow to
    evaluate certain inputs containing large sequences of nested
    incomplete HTML entities. The strip_tags() method is used to
    implement the corresponding striptags template filter, which was
    thus also vulnerable.

    strip_tags() now avoids recursive calls to HTMLParser when
    progress removing tags, but necessarily incomplete HTML entities,
    stops being made.

    Remember that absolutely NO guarantee is provided about the
    results of strip_tags() being HTML safe. So NEVER mark safe the
    result of a strip_tags() call without escaping it first, for
    example with django.utils.html.escape().

For Debian 8 "Jessie", these has been fixed in python-django version
1.7.11-1+deb8u7.

We recommend that you upgrade your python-django packages. You can
find more information in upstream's announcement:

  https://www.djangoproject.com/weblog/2019/aug/01/security-releases/

Thanks to Carlton Gibson et al. for their handling of these issues.


Regards,

- -- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      lamby@debian.org / chris-lamb.co.uk
       `-

-----BEGIN PGP SIGNATURE-----
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=ZinI
-----END PGP SIGNATURE-----


Reply to: