First published: Tue Mar 06 2018(Updated: )
James Davis discovered that Django incorrectly handled certain template filters. A remote attacker could possibly use this issue to cause Django to consume resources, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python-django | <1:1.11.4-1ubuntu1.2 | 1:1.11.4-1ubuntu1.2 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/python3-django | <1:1.11.4-1ubuntu1.2 | 1:1.11.4-1ubuntu1.2 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/python-django | <1.8.7-1ubuntu5.6 | 1.8.7-1ubuntu5.6 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/python3-django | <1.8.7-1ubuntu5.6 | 1.8.7-1ubuntu5.6 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/python-django | <1.6.11-0ubuntu1.2 | 1.6.11-0ubuntu1.2 |
Ubuntu OpenSSH Client | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Django vulnerability is CVE-2018-7536.
The vulnerability in Django can cause a denial of service by consuming excessive resources.
Versions 1.11.4 and earlier of python-django and python3-django are affected.
Update python-django and python3-django to version 1.11.4-1ubuntu1.2 or later.
You can find more information about this Django vulnerability at the following links: [CVE-2018-7536](https://ubuntu.com/security/CVE-2018-7536) and [CVE-2018-7537](https://ubuntu.com/security/CVE-2018-7537).