First published: Wed Feb 13 2019(Updated: )
It was discovered that Django incorrectly handled formatting certain numbers. A remote attacker could possibly use this issue to cause Django to consume resources, leading to a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python-django | <1:1.11.15-1ubuntu1.2 | 1:1.11.15-1ubuntu1.2 |
Ubuntu OpenSSH Client | =18.10 | |
All of | ||
ubuntu/python3-django | <1:1.11.15-1ubuntu1.2 | 1:1.11.15-1ubuntu1.2 |
Ubuntu OpenSSH Client | =18.10 | |
All of | ||
ubuntu/python-django | <1:1.11.11-1ubuntu1.3 | 1:1.11.11-1ubuntu1.3 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/python3-django | <1:1.11.11-1ubuntu1.3 | 1:1.11.11-1ubuntu1.3 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/python-django | <1.8.7-1ubuntu5.8 | 1.8.7-1ubuntu5.8 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/python3-django | <1.8.7-1ubuntu5.8 | 1.8.7-1ubuntu5.8 |
Ubuntu OpenSSH Client | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Django vulnerability is USN-3890-1.
This Django vulnerability can lead to a denial of service by causing resource consumption.
A remote attacker can exploit this Django vulnerability by formatting certain numbers.
The versions 1.11.15-1ubuntu1.2, 1.11.11-1ubuntu1.3, and 1.8.7-1ubuntu5.8 of Django are affected by this vulnerability.
To fix this Django vulnerability, update the python-django or python3-django package to version 1:1.11.15-1ubuntu1.2 or later.