[ASA-201902-14] python-django: denial of service
Levente Polyak
anthraxx at archlinux.org
Tue Feb 12 23:14:48 UTC 2019
Arch Linux Security Advisory ASA-201902-14
==========================================
Severity: Medium
Date : 2019-02-12
CVE-ID : CVE-2019-6975
Package : python-django
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-881
Summary
=======
The package python-django before version 2.1.6-1 is vulnerable to
denial of service.
Resolution
==========
Upgrade to 2.1.6-1.
# pacman -Syu "python-django>=2.1.6-1"
The problem has been fixed upstream in version 2.1.6.
Workaround
==========
None.
Description
===========
Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before
2.1.6 allows uncontrolled memory consumption via a malicious attacker-
supplied value to the django.utils.numberformat.format() function.
If the affected numberformat function as used by contrib.admin as well
as the the floatformat, filesizeformat, and intcomma templates filters
receives a Decimal with a large number of digits or a large exponent,
it could lead to significant memory usage due to a call to
'{:f}'.format().
Impact
======
A remote attacker is able to crash a target server that uses float-
number-based filters by making the server filter numbers with very
large exponents or number of digits.
References
==========
https://www.djangoproject.com/weblog/2019/feb/11/security-releases/
https://www.openwall.com/lists/oss-security/2019/02/11/1
https://github.com/django/django/commit/0bbb560183fabf0533289700845dafa94951f227
https://github.com/django/django/commit/40cd19055773705301c3428ed5e08a036d2091f3
https://security.archlinux.org/CVE-2019-6975
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20190213/c9887224/attachment.sig>
More information about the arch-security
mailing list