SB2018031346 - Fedora 28 update for python2-django1.11



SB2018031346 - Fedora 28 update for python2-django1.11

Published: March 13, 2018 Updated: April 24, 2025

Security Bulletin ID SB2018031346
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Improper input validation (CVE-ID: CVE-2018-7536)

The vulnerability allows a remote unauthenticated attacker to cause DoS condition on the target system.

The weakness exists in the django.utils.html.urlize() function due to insufficient validation of user-supplied input. A remote attacker can submit a specially crafted input and cause the service to crash.

2) Resource exhaustion (CVE-ID: CVE-2018-7537)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the django.utils.html.urlize() function due to it was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions. The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable. A remote attacker can cause the service to crash.

Remediation

Install update from vendor's website.