diff options
| author | Narpat Mali <narpat.mali@windriver.com> | 2023-11-30 12:23:37 +0000 |
|---|---|---|
| committer | Armin Kuster <akuster808@gmail.com> | 2024-01-12 07:14:16 -0500 |
| commit | fee55605480b07337a6dc953a848f6a7e31f9a85 (patch) | |
| tree | 46a564fd1a53649a739671e154694320d43a44c9 /meta-python/recipes-devtools/python/python3-pkgconfig_1.5.5.bb | |
| parent | 8a042b540db5421785edcf21d5114be6358246fd (diff) | |
| download | meta-openembedded-fee55605480b07337a6dc953a848f6a7e31f9a85.tar.gz | |
python3-django: Fix for CVE-2023-43665 and CVE-2023-46695
CVE-2023-43665:
In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the
django.utils.text.Truncator chars() and words() methods (when used with
html=True) are subject to a potential DoS (denial of service) attack via
certain inputs with very long, potentially malformed HTML text. The chars()
and words() methods are used to implement the truncatechars_html and
truncatewords_html template filters, which are thus also vulnerable.
NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.
CVE-2023-46695:
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and
4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence,
django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of
service) attack via certain inputs with a very large number of Unicode characters.
References:
https://www.djangoproject.com/weblog/2023/oct/04/security-releases/
https://www.djangoproject.com/weblog/2023/nov/01/security-releases/
Signed-off-by: Narpat Mali <narpat.mali@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-pkgconfig_1.5.5.bb')
0 files changed, 0 insertions, 0 deletions
