summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python3-pyhamcrest_2.0.3.bb
diff options
context:
space:
mode:
authorNarpat Mali <narpat.mali@windriver.com>2023-11-30 12:23:37 +0000
committerArmin Kuster <akuster808@gmail.com>2024-01-12 07:14:16 -0500
commitfee55605480b07337a6dc953a848f6a7e31f9a85 (patch)
tree46a564fd1a53649a739671e154694320d43a44c9 /meta-python/recipes-devtools/python/python3-pyhamcrest_2.0.3.bb
parent8a042b540db5421785edcf21d5114be6358246fd (diff)
downloadmeta-openembedded-fee55605480b07337a6dc953a848f6a7e31f9a85.tar.gz
python3-django: Fix for CVE-2023-43665 and CVE-2023-46695
CVE-2023-43665: In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232. CVE-2023-46695: An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters. References: https://www.djangoproject.com/weblog/2023/oct/04/security-releases/ https://www.djangoproject.com/weblog/2023/nov/01/security-releases/ Signed-off-by: Narpat Mali <narpat.mali@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-pyhamcrest_2.0.3.bb')
0 files changed, 0 insertions, 0 deletions