Arch Linux Security Advisory ASA-201902-14
=========================================
Severity: Medium
Date    : 2019-02-12
CVE-ID  : CVE-2019-6975
Package : python-django
Type    : denial of service
Remote  : Yes
Link    : https://security.archlinux.org/AVG-881

Summary
======
The package python-django before version 2.1.6-1 is vulnerable to
denial of service.

Resolution
=========
Upgrade to 2.1.6-1.

# pacman -Syu "python-django>=2.1.6-1"

The problem has been fixed upstream in version 2.1.6.

Workaround
=========
None.

Description
==========
Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before
2.1.6 allows uncontrolled memory consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function.
If the affected numberformat function as used by contrib.admin as well
as the the floatformat, filesizeformat, and intcomma templates filters
receives a Decimal with a large number of digits or a large exponent,
it could lead to significant memory usage due to a call to
'{:f}'.format().

Impact
=====
A remote attacker is able to crash a target server that uses float-number-based filters by making the server filter numbers with very
large exponents or number of digits.

References
=========
https://www.djangoproject.com/weblog/2019/feb/11/security-releases/
https://www.openwall.com/lists/oss-security/2019/02/11/1
https://github.com/django/django/commit/0bbb560183fabf0533289700845dafa94951f227
https://github.com/django/django/commit/40cd19055773705301c3428ed5e08a036d2091f3
https://security.archlinux.org/CVE-2019-6975

ArchLinux: 201902-14: python-django: denial of service

February 13, 2019

Summary

Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows uncontrolled memory consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function. If the affected numberformat function as used by contrib.admin as well as the the floatformat, filesizeformat, and intcomma templates filters receives a Decimal with a large number of digits or a large exponent, it could lead to significant memory usage due to a call to '{:f}'.format().

Resolution

Upgrade to 2.1.6-1. # pacman -Syu "python-django>=2.1.6-1"
The problem has been fixed upstream in version 2.1.6.

References

https://www.djangoproject.com/weblog/2019/feb/11/security-releases/ https://www.openwall.com/lists/oss-security/2019/02/11/1 https://github.com/django/django/commit/0bbb560183fabf0533289700845dafa94951f227 https://github.com/django/django/commit/40cd19055773705301c3428ed5e08a036d2091f3 https://security.archlinux.org/CVE-2019-6975

Severity
Package : python-django
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-881

Workaround

None.

Related News