First published: Wed Jul 05 2023(Updated: )
Seokchan Yoon discovered that Django incorrectly handled certain regular expressions. A remote attacker could possibly use this issue to cause Django to consume resources, leading to a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python3-django | <3:3.2.18-1ubuntu0.3 | 3:3.2.18-1ubuntu0.3 |
Ubuntu Ubuntu | =23.04 | |
All of | ||
ubuntu/python3-django | <3:3.2.15-1ubuntu1.4 | 3:3.2.15-1ubuntu1.4 |
Ubuntu Ubuntu | =22.10 | |
All of | ||
ubuntu/python3-django | <2:3.2.12-2ubuntu1.7 | 2:3.2.12-2ubuntu1.7 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/python3-django | <2:2.2.12-1ubuntu0.18 | 2:2.2.12-1ubuntu0.18 |
Ubuntu Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6203-1 is moderate.
The vulnerability could allow a remote attacker to cause a denial of service by consuming system resources.
Versions 2.2.12-1ubuntu0.18, 2.2.12-2ubuntu1.7, 3.2.15-1ubuntu1.4, and 3.2.18-1ubuntu0.3 of python3-django are affected.
To fix the vulnerability, update your python3-django package to version 3.2.18-1ubuntu0.3 (for Ubuntu 20.04), 3.2.15-1ubuntu1.4 (for Ubuntu 22.10), 3.2.12-2ubuntu1.7 (for Ubuntu 22.04), or 2.2.12-1ubuntu0.18 (for Ubuntu 23.04).
You can find more information about USN-6203-1 on the Ubuntu website.